Firebox Configuration Report
Firebox Configuration Report
7:8080/system/configuration
Contents
Configuration
1. Network
1-1 Interfaces
Network Configuration
Configuration Interface in Mixed Routing Mode.
Interface Details
Interface 0 [ Cluster_Interface ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 3 [ Optional-2 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 4 [ DMZ-WLAN ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Mode DHCP Server
Domain Name None
Lease Time 1 day
DHCP Address Pool 172.31.252.1 - 172.31.252.250
Reserved Address Pool None
DNS Server None
WINS Server None
Interface 5 [ IPPhone ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Mode DHCP Relay
DHCP
IP Address 172.17.0.83
Interface 6 [ T-Com_WAN ]
80.156.231.140/29
Secondary IP Address 80.156.231.141/29
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
IP Address 2003:41:C02D:0:0:0:0:3/48
HOP Limit 64
IPv6 DAD Transmit 1
Send Advertisement
M Flag
O Flag
Default Lifetime
Maximum Interval
Minimal Interval
Interface 7 [ SuS_Labor ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 8 [ Uplink-Core ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 9 [ Optional-8 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 10 [ Optional-9 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 11 [ Optional-10 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 12 [ Optional-11 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 13 [ Optional-12 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 14 [ Optional-13 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 15 [ Optional-14 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 16 [ Optional-15 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 17 [ Optional-16 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 18 [ Optional-17 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
Interface 19 [ Optional-18 ]
Secondary IP Address None
MAC Address None
Traffic Management Outgoing Interface Bandwidth [ Unlimited ]
Marking Type [ IP Precedence ]
QoS Marking Method [ Preserve ]
Prioritize traffic based on QoS Marking [ Disabled ]
1-4 VLAN
VLAN
ID Alias Zone IP Address DHCP Address Pool Interface
5 Funk-Scan-Kiosk-DMZ Trusted 172.31.253.254 /24 Enabled 172.31.253.1 - 172.31.253.200 bond0
800 Guest Custom 100.94.255.250 /16 Enabled 100.94.0.1 - 100.94.250.0 bond0
999 Management Trusted 10.100.254.1 /24 Disabled bond0
1-5 Bridge
Disabled
1-6 Loopback
Disabled
1-7 Multi-WAN
Disabled
1-8 SD-WAN
Disabled
1-11 NAT
Dynamic NAT
From To
172.17.0.0/16 Any-External
192.168.0.0/16 Any-External
DMZ-WLAN Any-External
DarkTrace_Netz Any-External
1-to-1 NAT
Interface Type NAT Base Real Base
T-Com_WAN IP Range 80.156.231.140 - 80.156.231.140 192.168.200.15 - 192.168.200.15
1-12 Routes
Routes
Route To Gateway Distance
10.0.91.0 /28 172.17.0.7 1
10.0.91.16 /28 172.17.15.3 1
10.81.234.0 /24 172.17.15.1 1
172.16.0.0 /16 172.17.15.1 1
172.17.0.0 /16 172.17.0.7 1
172.18.0.0 /16 172.17.15.1 1
172.19.0.0 /16 172.17.15.1 1
172.20.0.0 /16 172.17.15.1 1
172.21.0.0 /16 172.17.15.1 1
172.29.0.0 /32 172.29.254.254 1
172.31.252.0 /24 172.31.252.254 1
172.31.253.0 /24 172.31.253.254 1
172.31.254.0 /24 172.17.15.3 1
192.168.200.11 /32 192.168.200.7 1
192.168.81.0 /24 172.17.15.1 1
192.17.1.0 /24 192.17.1.7 1
194.31.221.33 /32 172.17.15.1 1
194.31.221.35 /32 172.17.15.1 1
80.67.237.159 /32 172.17.0.7 1
80.67.237.238 /32 172.17.0.7 1
1-16 Modem
Disabled
1-17 Wireless
M690 does not have wireless capabilities.
2. Firewall
Firewall Policies
Order Status Action Policy Name Log Alarm From To Port
1 Enabled Allow SSH.2 Disabled Disabled S+S LAN Management TCP:22
2 Enabled Allow SSH.1 Disabled Disabled Management Any TCP:22
3 Enabled Allow TFTP.1 Disabled Disabled Management S+S LAN UDP:69
4 Enabled Allow SNMP.2 Disabled Disabled Management 172.17.0.230 UDP:161
UDP:32768-65000
UDP:16384-32767
vLan_99 vLan_99
S+S LAN S+S LAN
128 Enabled Allow SNMP-Trap Enabled Disabled UDP:162
S+S DMZ S+S DMZ
SUS_DMZ SUS_DMZ
TCP:2051
129 Enabled Allow DATA_Domain_REP_Port Enabled Disabled Any-Trusted 172.17.1.200 TCP:3009
UDP:2051
S+S LAN S+S LAN TCP:49152-65535
130 Disabled Allow DellPerfomance Disabled Disabled
S+S DMZ S+S DMZ TCP:135
UDP:3478-3481
131 Enabled Allow SkypeBuisiness Disabled Disabled S+S LAN T-Com_WAN UDP:50000-60000
TCP:50000-60000
132 Enabled Proxy TEN-IT_VPN_DATA_DOMAIN.in Enabled Disabled tunnel.1 172.17.1.0/255.255.255.0 TCP:443
133 Enabled Allow Dakoso_Vpn.in Disabled Disabled Dacoso_Darktrace_VPN Any Any
134 Enabled Allow Lobster_VPN.in Disabled Disabled Lobster-DATA-Live238_Stage159 Any Any
135 Enabled Allow SAP_VPN_Nagarro_.in Disabled Disabled Nagarro DEFRA Any Any
Nagarro DEFRA
136 Enabled Allow BOVPN-Allow.in Disabled Disabled tunnel.1 Any Any
Lobster-DATA-Live238_Stage159
SSH.2
Status Action From To
Enabled Allow S+S LAN Management
Protocol SSH
Port TCP:22
Comment Policy added on 2023-11-23T17:37:28+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SSH.1
Status Action From To
Enabled Allow Management Any
Protocol SSH
Port TCP:22
Comment Policy added on 2023-11-23T17:36:02+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
TFTP.1
Status Action From To
Enabled Allow Management S+S LAN
Protocol TFTP
Port UDP:69
Comment Policy added on 2023-11-23T17:42:30+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SNMP.2
Status Action From To
Enabled Allow Management 172.17.0.230
Protocol SNMP
Port UDP:161
Comment Policy added on 2023-11-24T13:39:38+01:00.
Proxy Action
Send Log Messages Disabled
Properties Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
SNMP
Status Action From To
SUS_LAN SuS Server
SUS_DMZ SUS_LAN
Enabled Allow
SuS Server SUS_DMZ
vLan_99 vLan_99
Protocol SNMP
Port UDP:161
Comment Policy added on 2022-05-30T18:33:48+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SNMP.1
Status Action From To
Enabled Allow 172.17.0.230 Management
Protocol SNMP
Port UDP:161
Comment Policy added on 2023-11-24T13:19:38+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
NTP.1
Status Action From To
216.239.35.4
Management 216.239.35.0
Enabled Allow
172.17.0.44 216.239.35.8
216.239.35.12
Protocol NTP
TCP:123
Port UDP:123
Comment Policy added on 2023-11-24T09:47:47+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Exchange365
Status Action From To
Enabled Allow ExchangeOnline-IP-Bereich Exchange365.snat
Protocol Exchange365
TCP:25
Port TCP:443
Comment Policy added on 2022-05-13T11:22:20+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
Access
Status Action From To
Enabled Allow Management 172.17.0.230
Protocol Any
Port Any
Comment Policy added on 2023-11-24T15:27:22+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Access.1
Status Action From To
Enabled Allow 172.17.0.230 Management
Protocol Any
Port Any
Comment Policy added on 2023-11-24T15:55:30+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
BOVPN-Allow.out
Status Action From To
Nagarro DEFRA
Enabled Allow Any tunnel.1
Lobster-DATA-Live238_Stage159
Protocol Any
Port Any
Comment Policy added on 2022-04-04T13:56:54+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Dakoso_Vpn.out
Status Action From To
Enabled Allow Any Dacoso_Darktrace_VPN
Protocol Any
Port Any
Comment Created by BOVPN Policy Wizard
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Lobster_VPN.out
Status Action From To
Enabled Allow Any Lobster-DATA-Live238_Stage159
Protocol Any
Port Any
Properties
Comment Created by BOVPN Policy Wizard
Proxy Action
SAP_VPN_Nagarro_.out
Status Action From To
Enabled Allow Any Nagarro DEFRA
Protocol Any
Port Any
Comment Created by BOVPN Policy Wizard
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
TEN-IT_VPN_DATA_DOMAIN.out
Status Action From To
Enabled Proxy 172.17.1.0/255.255.255.0 tunnel.1
Protocol HTTPS-proxy
Port TCP:443
Comment Created by BOVPN Policy Wizard
Proxy Action HTTPS-Client.Standard
Send Log Messages Enabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Any_fuer_PC131-10_PC061_PC151
Status Action From To
Enabled Allow Admin-PC Any
Protocol Any
Port Any
Comment Policy added on 2019-02-18T08:34:03+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Protocol Any
Port Any
Comment Policy added on 11.01.10 14:56.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
NAT 1-to-1 NAT Enabled
Any_fuer_GLG
Status Action From To
Disabled Allow 172.17.21.75 T-Com_WAN
Protocol Any
Port Any
Comment Policy added on 2014-08-25T12:40:41+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Any_On_Way_Labor
Status Action From To
Enabled Allow Admin-PC-Alle SuS-Labor
Protocol Any
Port Any
Comment Policy added on 2022-11-07T18:44:24+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Ports_Data_Domain_Rep
Status Action From To
172.17.1.200 Any-External
Enabled Allow
Any-External 172.17.1.200
Protocol Ports_Data_Domain_Rep
Port TCP:2051
Comment Policy added on 2022-11-02T11:19:10+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
FTP
Status Action From To
Enabled Allow S+S LAN Any-External
Protocol FTP
Port TCP:21
Comment Policy added on 08.09.08 15:07.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SFTP
Status Action From To
Enabled Allow BCD Travel User Any
Protocol SFTP
Properties Port TCP:22
Comment Policy added on 2022-07-06T11:26:03+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SSH_zum_Finanzamt
Status Action From To
Enabled Allow S+S LAN 80.245.147.91
Protocol SSH
Port TCP:22
Comment Policy added on 20.07.10 12:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SFTP zu Eckardt
Status Action From To
Enabled Allow 172.17.0.39 78.46.133.97
Protocol SSH
Port TCP:22
Comment Policy added on 2021-08-02T16:14:25+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SFTP zu Dakosy
Status Action From To
172.17.22.131
Enabled Allow 172.17.0.9 195.244.0.70
172.17.0.39
SSH
Status Action From To
IPPhone S+S LAN
Enabled Allow
S+S LAN IPPhone
Protocol SSH
Port TCP:22
Comment Policy added on 2018-06-07T15:15:38+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
SSH zu DMZ
Status Action From To
S+S DMZ
Enabled Allow S+S LAN SUS_DMZ
SuS-Labor
Protocol SSH
Port TCP:22
Comment Policy added on 2013-10-07T15:31:52+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SSH-8443 DELL
Status Action From To
DELL_Supp_assi_port DELL_Supp_assi_port
Enabled Allow
ESX_SC_Supp_assi ESX_SC_Supp_assi
Protocol SSH-8443
TCP:8443
Port TCP:22
Comment Policy added on 2020-10-30T14:12:14+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Protocol SSH
Port TCP:22
Comment Policy added on 2020-10-30T10:05:21+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Barcodescanner_Telnet
Status Action From To
Enabled Allow Funk-Scan-Kiosk-DMZ 172.17.0.1
Protocol Telnet
Port TCP:23
Comment Policy added on 11.03.10 11:53.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
CMN-DO02
Protocol CMN-DO02
TCP:8961
TCP:1352
Port UDP:1352
UDP:8961
Comment Policy added on 2022-09-12T10:49:58+02:00.
Proxy Action
Send Log Messages Enabled
Properties Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Alarm-Server Port
Status Action From To
Enabled Allow Any-External Alarmserver.snat
SMTP-in-proxy
Status Action From To
62.245.148.8
Disabled Proxy 62.245.148.9 SMTP_in_Tcom.snat.snat
94.199.89.34
Protocol SMTP-proxy
TCP:25
Port TCP:465
Comment Policy added on 2017-07-24T14:08:23+02:00.
Proxy Action SMTP-Incoming.SuS
Send Log Messages Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SMTP-Ferarri-Fax
Status Action From To
Enabled Allow 172.17.0.111 schillseilacher0365.mail.protection.outlook.com
Protocol SMTP
Port TCP:25
Comment Policy added on 2023-11-14T09:40:53+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SMTP_in
Status Action From To
62.245.148.8
62.245.148.9
94.199.89.34
Enabled Allow SMTP_in_Tcom.snat.snat
94.199.92.185
94.199.92.188~94.199.92.191
94.199.92.177~94.199.92.182
Port TCP:25
Comment Policy added on 09.09.08 08:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SMTP_DMZ_zu_LAN
Status Action From To
S+S DMZ
Enabled Allow S+S LAN
SUS_DMZ
Protocol SMTP
Port TCP:25
Comment Policy added on 09.09.08 08:19.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SMTP-out-proxy
Status Action From To
172.17.0.2
Disabled Proxy Any-External
172.17.0.43
Protocol SMTP-proxy
TCP:25
Port
TLS Support [ Disabled ]
Comment Policy added on 2017-07-24T14:50:37+02:00.
Proxy Action SMTP-Outgoing.SuS
Send Log Messages Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SMTP_Out
Status Action From To
Domino-SRV
Enabled Allow Any-External
172.17.0.103
Protocol SMTP
Port TCP:25
Comment Policy added on 09.09.08 11:18.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SMTP_dmzWLAN
Status Action From To
Enabled Allow DMZ-WLAN Any-External
Protocol SMTP
Port TCP:25
Comment Policy added on 10.03.09 15:05.
Proxy Action
Send Log Messages Disabled
Properties Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
DHCP-Server
Status Action From To
IPPhone IPPhone
Enabled Allow
172.17.0.83 172.17.0.83
Protocol DHCP-Server
Port UDP:67
Comment Policy added on 2018-06-07T15:13:58+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
TFTP
Status Action From To
IPPhone 172.17.0.83
Enabled Allow
172.17.0.83 IPPhone
Protocol TFTP
Port UDP:69
Comment Policy added on 2018-06-07T15:16:57+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Protocol SSL-VPN
Port TCP:443
Comment Policy added on 2021-01-20T14:40:18+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT All traffic in this policy [ 80.156.231.141 ]
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Luja_PNA_Ports
Status Action From To
Enabled Allow PNA_Port_Freigabe T-Com_WAN
Protocol Luja_PNA_Ports
TCP:65263
Port TCP:4000
TCP:4321
Comment Policy added on 2022-02-24T11:41:09+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP_DMZ_LAN
Protocol HTTP
Port TCP:80
Comment Policy added on 15.09.08 13:50.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP_zu_DMZ
Status Action From To
S+S DMZ
Enabled Allow Any-Trusted
SUS_DMZ
Protocol HTTP
Port TCP:80
Comment Policy added on 13.09.08 10:50.
Proxy Action
Send Log Messages Enabled
Send log message for reports Enabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP in T Webmailer
Status Action From To
Enabled Allow Any-External HTTP_TCOM_Webmailer.snat.snat
Protocol HTTP
Port TCP:80
Comment Policy added on 2014-06-18T15:06:55+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP_dmzWLAN_intranet
Status Action From To
Enabled Allow DMZ-WLAN 172.17.0.22
Protocol HTTP
Port TCP:80
Comment Policy added on 2014-07-15T08:54:27+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP-proxy.GLG
Status Action From To
172.17.21.149
Enabled Proxy T-Com_WAN
172.17.21.75
Protocol HTTP-proxy
Port TCP:80
Comment Policy added on 2017-06-13T12:02:14+02:00.
Properties Proxy Action HTTP-Client_GLG
Send Log Messages Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP-Kiosk_zu_Intranet
Status Action From To
Enabled Allow Funk-Scan-Kiosk-DMZ S+S LAN
Protocol HTTP
Port TCP:80
Comment Policy added on 2014-11-12T09:20:03+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP-proxy-Wachter
Status Action From To
Enabled Proxy MuK Any-External
Protocol HTTP-proxy
Port TCP:80
Comment Policy added on 2018-03-16T11:24:15+01:00.
Proxy Action HTTP-Client.Wachter
Send Log Messages Enabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP-proxy-KIOSKPC
Status Action From To
Enabled Proxy KIOSKPC Any-External
Protocol HTTP-proxy
Port TCP:80
Comment Policy added on 2022-06-28T09:05:08+02:00.
Proxy Action HTTP-Client.KIOSKPC
Send Log Messages Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP-proxy
Status Action From To
S+S DMZ
DMZ-WLAN
Enabled Proxy VPN-Benutzer Any-External
vLan_99
SUS_LAN
Protocol HTTP-proxy
Port TCP:80
Comment Policy added on 22.09.08 10:08.
Proxy Action HTTP-Client.Standard.1
Send Log Messages Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTP-Deny
Status Action From To
Enabled Block SUS_LAN Any-External
Protocol HTTP
Port TCP:80
Comment Policy added on 08.10.09 08:07.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
POP3_dmzWLAN
Status Action From To
Enabled Allow DMZ-WLAN Any-External
Protocol POP3
Port TCP:110
Comment Policy added on 2013-02-13T12:03:35+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
IMAP_dmzWLAN
Status Action From To
Enabled Allow DMZ-WLAN Any-External
Protocol IMAP
Port TCP:143
Comment Policy added on 04.03.09 15:39.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SNMP-von DESSBLX022
Status Action From To
172.17.0.22
Enabled Allow Firebox
172.17.0.52
Protocol SNMP
Port UDP:161
Comment Policy added on 18.03.09 14:10.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Z39-50_SciFinder
Status Action From To
Enabled Allow S+S LAN Any-External
Protocol Z39-50
Port TCP:210
Comment Policy added on 09.09.08 11:16.
Properties Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
DMZ-AD-Anbindung
Status Action From To
SUS_DMZ SUS_DMZ
Enabled Allow
SUS_LAN SUS_LAN
Protocol LDAP-TCP+UDP
TCP:389
UDP:389
TCP:49769
TCP:445
TCP:49783
Port TCP:88
TCP:135
TCP:49668
TCP:49674
TCP:49669
TCP:8027
Comment Policy added on 2021-01-18T15:22:49+01:00.
Properties Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Protocol LDAP
Port TCP:389
Comment Policy added on 2013-10-07T15:43:33+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Helpdesk-Port
Status Action From To
172.17.0.45 172.17.0.45
Enabled Allow
192.168.200.1 192.168.200.1
Protocol Helpdesk-Port
Port TCP:8383
Comment Policy added on 2021-01-18T15:53:27+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS-in-140-DMZ
Status Action From To
Enabled Proxy Any-External HTTP_TCOM_Webmailer.snat.snat
Protocol HTTPS-proxy
Port TCP:443
Comment Policy added on 2019-10-26T09:28:00+02:00.
Proxy Action HTTPS-Server.Domino.in.DMZ
Properties Send Log Messages Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
HTTPS-proxy-AV.Webmailer
Status Action From To
Disabled Proxy Any-External HTTP_TCOM_Webmailer.snat.snat
Protocol HTTPS-proxy
Port TCP:443
Comment Policy added on 2015-08-05T13:06:39+02:00.
Proxy Action HTTPS-AVScanner
Send Log Messages Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS in T Webmailer
Status Action From To
Disabled Allow Any-External HTTP_TCOM_Webmailer.snat.snat
Protocol HTTPS
Port TCP:443
Comment Policy added on 2014-06-18T15:11:36+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS-in-141-DMZ
Status Action From To
Enabled Proxy Any-External nat Tcom MobIron.snat
Protocol HTTPS-proxy
Port TCP:443
Comment Policy added on 2019-11-18T09:50:13+01:00.
Proxy Action HTTPS-Server-MobileIron in DMZ
Send Log Messages Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS in Mobileiron
Status Action From To
Disabled Allow Any-External nat Tcom MobIron.snat
Protocol HTTPS
Port TCP:443
Comment Policy added on 2014-06-18T15:17:12+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS Sentry in
Status Action From To
217.8.57.160 S+S DMZ
Enabled Allow
217.91.174.143 SUS_DMZ
Protocol Port8443
Port TCP:8443
Comment Policy added on 2013-10-11T13:38:40+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS mobileiron.com
Status Action From To
69.90.213.47
S+S DMZ
Enabled Allow 72.51.53.5
SUS_DMZ
72.51.53.6
Protocol HTTPS
Port TCP:443
Comment Policy added on 2013-10-08T08:33:06+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS-proxy_GLG
Status Action From To
172.17.21.75
Enabled Proxy T-Com_WAN
172.17.21.149
Protocol HTTPS-proxy
Port TCP:443
Comment Policy added on 2017-06-13T12:09:29+02:00.
Proxy Action HTTPS-Client_GLG
Send Log Messages Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS-DMZ-LAN
Status Action From To
S+S LAN S+S DMZ
Enabled Allow S+S DMZ S+S LAN
SUS_DMZ SUS_DMZ
Protocol HTTPS
Port TCP:443
Comment Policy added on 2013-10-07T15:37:10+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS_dmzWLAN
Status Action From To
S+S DMZ
Enabled Allow DMZ-WLAN
SUS_DMZ
Protocol HTTPS
Port TCP:443
Comment Policy added on 2013-10-23T10:04:54+02:00.
Proxy Action
Properties
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
HTTPS_ESRS
Status Action From To
Enabled Allow 172.17.0.201 Any-External
Protocol HTTPS
Port TCP:443
Comment Policy added on 2017-07-18T14:18:59+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS-proxy.Wachter
Status Action From To
Enabled Proxy MuK Any-External
Protocol HTTPS-proxy
Port TCP:443
Comment Policy added on 2018-03-16T11:29:33+01:00.
Proxy Action HTTPS-Client.Wachter
Send Log Messages Enabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS-proxy-KIOSKPC
Status Action From To
Enabled Proxy KIOSKPC Any-External
Protocol HTTPS-proxy
Port TCP:443
Comment Policy added on 2022-06-28T09:08:36+02:00.
Proxy Action HTTPS-Client.KIOSKPC
Send Log Messages Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS-proxy
Status Action From To
S+S DMZ
DMZ-WLAN
Enabled Proxy VPN-Benutzer Any-External
vLan_99
SUS_LAN
Protocol HTTPS-proxy
Port TCP:443
Comment Policy added on 22.09.08 10:09.
Proxy Action HTTPS-Client.2
Send Log Messages Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS_ESX_SC_Support_Assistent
Protocol HTTPS
Port TCP:443
Comment Policy added on 2020-10-30T10:03:33+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS-Deny
Status Action From To
Enabled Block Any Any-External
Protocol HTTPS
Port TCP:443
Comment Policy added on 08.10.09 08:08.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SMTP-SSL_dmzWLAN
Status Action From To
Enabled Allow DMZ-WLAN Any-External
Protocol SMTP-SSL
Port TCP:465
Comment Policy added on 2013-02-13T12:19:46+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
IMAP-SSL_dmzWLAN
Status Action From To
Enabled Allow DMZ-WLAN Any-External
Protocol IMAP-SSL
Port TCP:993
Comment Policy added on 2013-02-13T12:08:54+01:00.
Proxy Action
Properties Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Gast-Wlan-Port 8443
Status Action From To
Enabled Allow DMZ-WLAN Any-External
Protocol Port8443
Port TCP:8443
Comment Policy added on 2023-06-20T10:56:03+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Groupwise_in
Status Action From To
Disabled Allow 172.16.25.248 S+S LAN
Protocol Groupwise
Port TCP:1677
Comment Policy added on 17.09.08 09:40.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Groupwise_out
Status Action From To
172.16.25.248
Disabled Allow S+S LAN
Any-External
Protocol Groupwise
Port TCP:1677
Comment Policy added on 17.09.08 09:39.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Barcodescanner_Lizenzserver
Protocol Barcodescanner_Lizenzserver
Port UDP:1820
Comment Policy added on 11.03.10 11:56.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HBCI_fuer_SFirm
Status Action From To
Enabled Allow S+S LAN Any-External
Protocol HBCI
Port TCP:3000
Comment Policy added on 2011-07-14T10:39:23+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SRP BlackBerry
Status Action From To
S+S DMZ 93.186.25.33
Enabled Allow
SUS_DMZ 193.109.81.33
Protocol SRP
Port TCP:3101
Comment Policy added on 2012-05-30T12:25:17+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
RDP
Status Action From To
S+S DMZ
Funk-Scan-Kiosk-DMZ
S+S LAN
Enabled Allow SUS_LAN
SUS_DMZ
SUS_DMZ
SuS-Labor
Protocol RDP
Port TCP:3389
Comment Policy added on 2012-05-29T09:00:05+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS zu DMZ
Status Action From To
S+S DMZ
Enabled Allow Any-Trusted
SUS_DMZ
Protocol BB-https
Port TCP:3443
Properties
Comment Policy added on 2012-06-01T13:09:56+02:00.
Proxy Action
WatchGuard Authentication
Status Action From To
Any-Trusted
Enabled Allow Firebox
Any-Optional
Protocol WG-Auth
Port TCP:4100
Comment Policy added on 12.09.08 08:46.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Protocol WG-Cert-Portal
Port TCP:4126
Comment Policy added on 2017-01-27T14:01:16+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
ManageEnginePort8031
Status Action From To
S+S LAN Funk-Scan-Kiosk-DMZ
Enabled Allow
Funk-Scan-Kiosk-DMZ S+S LAN
Protocol Port8031
Port TCP:8031
Comment Policy added on 2017-02-20T09:28:17+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
WatchGuard Web UI
Status Action From To
Any-Trusted
Enabled Allow Firebox
Any-Optional
Port TCP:8080
Comment Policy added on 2011-05-07T13:36:06+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
ManageEnginePort8443
Status Action From To
S+S LAN Funk-Scan-Kiosk-DMZ
Enabled Allow
Funk-Scan-Kiosk-DMZ S+S LAN
Protocol Port8443
Port TCP:8443
Comment Policy added on 2017-02-20T09:29:10+01:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
HTTPS Sentry
Status Action From To
S+S DMZ
Enabled Allow Any-Trusted
SUS_DMZ
Port8443
Status Action From To
Enabled Allow 172.17.22.131 Any-External
Protocol Port8443
Port TCP:8443
Comment Policy added on 09.07.10 11:19.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Port8443-ESRS
Status Action From To
Enabled Allow 172.17.0.201 Any-External
Protocol Port8443
Port TCP:8443
Comment Policy added on 2017-07-18T14:14:32+02:00.
Proxy Action
Send Log Messages Disabled
Properties Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Traveler-Sync_DMZ_zu_LAN
Status Action From To
S+S DMZ
Enabled Allow S+S LAN
SUS_DMZ
Protocol Traveler-Sync
Port TCP:8642
Comment Policy added on 09.09.08 08:11.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Traveler-Sync_dmzWLAN_zuDMZ
Status Action From To
S+S DMZ
Enabled Allow DMZ-WLAN
SUS_DMZ
Protocol Traveler-Sync
Port TCP:8642
Comment Policy added on 2013-02-13T11:12:32+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Traveler-Sync_WAN_zu_DMZ
Status Action From To
S+S DMZ
Enabled Allow Any-External
SUS_DMZ
Protocol Traveler-Sync
Port TCP:8642
Comment Policy added on 09.09.08 08:11.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Port 9001
Status Action From To
Enabled Allow S+S LAN Any-External
SMB-MobileIron-Fileserver
Protocol SMB
TCP:445
UDP:445
Port UDP:137-138
TCP:139
Comment Policy added on 2013-10-11T10:10:34+02:00.
Proxy Action
Send Log Messages Disabled
Properties Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Port9443-ESRS
Status Action From To
Enabled Allow 172.17.0.201 Any-External
Protocol Port9443
Port TCP:9443
Comment Policy added on 2018-06-01T11:22:29+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
NagiosClient
Status Action From To
S+S DMZ
Enabled Allow 172.17.0.22
SUS_DMZ
Protocol NagiosClient
Port TCP:12489
Properties
Comment Policy added on 2012-06-04T08:15:54+02:00.
Proxy Action
Port 51543
Status Action From To
Enabled Allow S+S LAN 141.47.248.3
Ping
Status Action From To
Enabled Allow Any-Trusted Any
Protocol Ping
ICMP
Port IPv6-ICMP
Comment Policy added on 08.09.08 15:07.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
DNS
Status Action From To
Firebox
S+S DMZ 172.17.0.10
Enabled Allow Any-Trusted 172.17.0.30
SUS_DMZ 172.17.0.50
172.17.0.60
Protocol DNS
TCP:53
Port UDP:53
Comment Policy added on 13.09.08 10:53.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
DNS.1
Status Action From To
Enabled Allow Any-Trusted Any-External
Protocol DNS
TCP:53
Port UDP:53
Comment Policy added on 13.09.08 13:36.
Proxy Action
Properties Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
NTP_DMZ
Status Action From To
S+S DMZ
Enabled Allow Funk-Scan-Kiosk-DMZ S+S LAN
SUS_DMZ
Protocol NTP
TCP:123
Port UDP:123
Comment Policy added on 09.09.08 11:23.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
NTP
Status Action From To
Enabled Allow Any-Trusted Firebox
Protocol NTP
TCP:123
Port UDP:123
Comment Policy added on 13.09.08 11:01.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
NTP_Extern
Status Action From To
Enabled Allow 172.17.0.50 Any-External
Protocol NTP
TCP:123
Port UDP:123
Comment Policy added on 15.09.08 14:40.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Lotus-Notes_Retarus-Replik
Status Action From To
172.17.0.2 82.135.18.168
Enabled Allow
172.17.0.43 82.135.18.169
Protocol Lotus-Notes
TCP:1352
Port UDP:1352
Comment Policy added on 09.09.08 11:31.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Lotus-Notes_DMZ_zu_LAN
Status Action From To
172.17.22.1
S+S DMZ
Enabled Allow 172.17.21.131
SUS_DMZ
Domino-SRV
Protocol Lotus-Notes
TCP:1352
Port UDP:1352
Comment Policy added on 15.09.08 13:31.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Lotus-Notes_LAN_zu_DMZ
Status Action From To
S+S DMZ
Enabled Allow Any-Trusted
SUS_DMZ
Protocol Lotus-Notes
TCP:1352
Port UDP:1352
Comment Policy added on 09.09.08 08:09.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Lotus-Notes_WAN-zu_DMZ
Status Action From To
S+S DMZ
Enabled Allow Any-External
SUS_DMZ
Protocol Lotus-Notes
TCP:1352
Port UDP:1352
Comment Policy added on 09.09.08 08:09.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Aplle MDM
Status Action From To
S+S DMZ
Enabled Allow 17.0.0.0/255.0.0.0
SUS_DMZ
Elster
Status Action From To
Enabled Allow S+S LAN Any-External
TCP:8000
Port UDP:8000
Comment Policy added on 09.09.08 11:14.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
IPSec
Status Action From To
S+S LAN
Enabled Allow T-Com_WAN
DMZ-WLAN
Protocol IPSec
UDP:4500
ESP:Any
Port AH:Any
UDP:500
Comment Policy added on 2014-10-23T07:55:01+02:00.
Proxy Action
Send Log Messages Disabled
Properties Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
WatchGuard
Status Action From To
Enabled Allow zugriff-Firewall Firebox
Protocol WG-Firebox-Mgmt
TCP:4103
TCP:4105
Port TCP:4117
TCP:4118
Comment Policy added on 08.09.08 15:07.
Proxy Action
Send Log Messages Disabled
Properties Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Barracuda VPN
Status Action From To
Enabled Allow DMZ-WLAN T-Com_WAN
AlcatelTelefon
Status Action From To
IPPhone S+S LAN
Enabled Allow
S+S LAN IPPhone
Protocol AlcatelTelefon
UDP:32000-32640
TCP:7
Properties TCP:67-69
Port TCP:80
TCP:443
TCP:10010
TCP:49712
TCP:19533-19535
UDP:32514-32770
TCP:124
TCP:5060
UDP:5060
UDP:10946-10947
UDP:15530-15531
UDP:10266-10267
UDP:10208-10209
UDP:32768-65000
UDP:16384-32767
Comment Policy added on 2018-06-07T15:12:22+02:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SNMP-Trap
Status Action From To
vLan_99 vLan_99
S+S LAN S+S LAN
Enabled Allow
S+S DMZ S+S DMZ
SUS_DMZ SUS_DMZ
Protocol SNMP-Trap
Port UDP:162
Comment Policy added on 2021-01-13T19:17:30+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
DATA_Domain_REP_Port
Status Action From To
Enabled Allow Any-Trusted 172.17.1.200
Protocol DATA_Domain_REP_Port
TCP:2051
Port TCP:3009
UDP:2051
Comment Policy added on 2023-02-22T13:34:31+01:00.
Proxy Action
Send Log Messages Enabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Disabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
DellPerfomance
Status Action From To
S+S LAN S+S LAN
Disabled Allow
S+S DMZ S+S DMZ
Protocol DellPerfomance
TCP:49152-65535
Port TCP:135
Comment Policy added on 2019-04-05T10:30:39+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SkypeBuisiness
Status Action From To
Enabled Allow S+S LAN T-Com_WAN
UDP:3478-3481
Port UDP:50000-60000
TCP:50000-60000
Comment Policy added on 2019-05-29T15:14:39+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
TEN-IT_VPN_DATA_DOMAIN.in
Status Action From To
Enabled Proxy tunnel.1 172.17.1.0/255.255.255.0
Protocol HTTPS-proxy
Port TCP:443
Comment Created by BOVPN Policy Wizard
Proxy Action HTTPS-Client.Standard
Send Log Messages Enabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Dakoso_Vpn.in
Status Action From To
Enabled Allow Dacoso_Darktrace_VPN Any
Protocol Any
Port Any
Comment Created by BOVPN Policy Wizard
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
Lobster_VPN.in
Status Action From To
Enabled Allow Lobster-DATA-Live238_Stage159 Any
Protocol Any
Port Any
Comment Created by BOVPN Policy Wizard
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
SAP_VPN_Nagarro_.in
Status Action From To
Enabled Allow Nagarro DEFRA Any
Protocol Any
Port Any
Comment Created by BOVPN Policy Wizard
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Properties Send SNMP trap Disabled
Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
BOVPN-Allow.in
Status Action From To
Nagarro DEFRA
Enabled Allow tunnel.1 Any
Lobster-DATA-Live238_Stage159
Protocol Any
Port Any
Comment Policy added on 2022-04-04T13:56:54+02:00.
Proxy Action
Send Log Messages Disabled
Send log message for reports Disabled
Send SNMP trap Disabled
Properties Send notification Disabled
Auto-block Disabled
Specify custom idle timeout None
Schedule Always On
Forward Action None
Reverse Action None
Connection Rate (per second) 0
ICMP ICMP Error Handling Disabled
1-to-1 NAT Enabled
NAT
Dynamic NAT Use Network NAT Settings
QoS Override per-interface settings Disabled
Sticky Connection Override Multi-WAN sticky connection setting Enabled
VPN-
Tunnel-MFA-
2 ✓ AlcatelTelefon
AlcatelTelefon Benutzer- Any, TCP:7, Any, TCP:80, TCP:443, TCP:10010, TCP:49712, Any, Any, TCP:124, TCP:5060, UDP:5060, Any, Any, Any, Any, Any, Any Global
MFA
Tunnel- VPN-
3 ✓ AlcatelTelefon.1
AlcatelTelefon
Benutzer
Any, TCP:7, Any, TCP:80, TCP:443, TCP:10010, TCP:49712, Any, Any, TCP:124, TCP:5060, UDP:5060, Any, Any, Any, Any, Any, Any
VPN-
4 ✓ VPN-DiehlES-Any Any
DiehlES
Any pruefen
VPN-
5 ✓ VPN-DiehlK-Any Any
DiehlK
Any pruefen
VPN-
VPN-Extern-MFA-
6 ✓ Any
Any Extern- Any
MFA
Bechtle-
7 ✓ Bechtle-IPSEC-Any Any
IPSEC
Any pruefen
BEOS-
8 ✓ BEOS-IPSEC-Any Any
IPSEC
Any Global pruefen
VPN-
9 ✓ VPN-iPhone-Any Any
iPhone
Any pruefen
VPN-
10 ✓ VPN-Benutzer-Any Any
Benutzer
Any
VPN-
13 ✓ VPN-Bilgram-Any Any
Bilgram
Any pruefen
VPN-
14 ✓ Tunnel-RDP RDP
Benutzer
TCP:3389 pruefen
VPN-
15 ✓ Tunnel-DNS DNS
Benutzer
TCP:53, UDP:53 Global
Tunnel-DHCP- VPN-
16 ✗ Server
DHCP-Server
Benutzer
UDP:67 Global
Tunnel- VPN-
17 ✓ AlcatelTelefon
AlcatelTelefon
Benutzer
Any, TCP:7, Any, TCP:80, TCP:443, TCP:10010, TCP:49712, Any, Any, TCP:124, TCP:5060, UDP:5060, Any, Any, Any, Any, Any, Any Global
Tunnel-Https-SW- VPN-
18 ✓ Netz
Https-SW-Netz
Benutzer
TCP:80, TCP:443 Global
Tunnel-Addison- VPN-
19 ✗ Ports
Addison-Ports
Benutzer
TCP:6001, UDP:6001, TCP:8080, UDP:8080, TCP:8090, UDP:8090, TCP:8100, UDP:8100, TCP:8110, UDP:8110 Global
VPN-
20 ✓ Tunnel-SSH SSH
Benutzer
TCP:22 Global
Tunnel- VPN-
22 ✓ OPAL_Lizens_Port.1
OPAL_Lizens_Port
Benutzer
TCP:5160 Global
VPN-
VPN-Benutzer-MFA-
23 ✓ Any
Any Benutzer- Any Global
MFA
VPN-
24 ✓ Tunnel-MFA-RDP.1 RDP Benutzer- TCP:3389 Global
MFA
VPN-
25 ✓ Tunnel-MFA-DNS DNS Benutzer- TCP:53, UDP:53 Global
MFA
VPN-
Tunnel-MFA-DHCP-
26 ✓ Server
DHCP-Server Benutzer- UDP:67 Global
MFA
VPN-
Tunnel-MFA-
27 ✓ Addison-Ports
Addison-Ports Benutzer- TCP:6001, UDP:6001, TCP:8080, UDP:8080, TCP:8090, UDP:8090, TCP:8100, UDP:8100, TCP:8110, UDP:8110 Global
MFA
VPN-
28 ✓ Tunnel-MFA-SSH SSH Benutzer- TCP:22 Global
MFA
VPN-
Tunnel-
29 ✓ OPAL_Lizens_Port
OPAL_Lizens_Port Benutzer- TCP:5160 Global
MFA
Tags pruefen
Application Control Application Control Action None
Forward Action (From > To) None
Traffic Management
Reverse Action (To > From) None
Scheduling Schedule Action Always On
Comment Policy added on 2014-06-23T16:04:39+02:00.
Advanced
Use policy-based ICMP error handling Disabled
Any-External
Allowed Resources 0.0.0.0/0
Enable Intrusion Prevention Disabled
Enable bandwidth and time quotas Disabled
Auto-block sites that attempt to connect Disabled
Specify custom idle timeout Disabled
Send a log message Disabled
Send a log message for reports Disabled
Send SNMP trap Disabled
Send notification Disabled
Tags pruefen
Application Control Application Control Action None
Forward Action (From > To) None
Traffic Management
Reverse Action (To > From) None
Scheduling Schedule Action Always On
Comment Policy added on 2017-01-24T14:08:03+01:00.
Advanced
Use policy-based ICMP error handling Disabled
2-4 Aliases
Alias
Alias Name Interface User Address Tunnel Description
Firebox Firebox Any 0.0.0.0 All local traffic associated with the Firebox
Any-External Any-External Any 0.0.0.0 All traffic associated with external interfaces
Any-Trusted Any-Trusted Any 0.0.0.0 All traffic associated with trusted interfaces
Any-Optional Any-Optional Any 0.0.0.0 All traffic associated with optional interfaces
Any-BOVPN Any-BOVPN Any 0.0.0.0 X All traffic associated with BOVPN
Any-Multicast Any-Multicast Any 0.0.0.0 All traffic associated with multicast protocols
S+S LAN S+S LAN Any 0.0.0.0 Built-in alias
DNS-Incoming
Proxy Name [ Proxy Type ] DNS-Incoming [ DNS ]
Logging For Reports Disabled
Diagnostics Override Level Disabled
DNS-Outgoing
Proxy Name [ Proxy Type ] DNS-Outgoing [ DNS ]
Logging For Reports Disabled
Diagnostics Override Level Disabled
Explicit-Web.Standard
Proxy Name [ Proxy Type ] Explicit-Web.Standard [ HTTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Enabled ]
WebBlocker [ Disabled ]
APT Blocker [ Disabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length 4096 bytes
Response Maximum Line Length 4096 bytes
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Enabled [ Logged ]
Enforce Safe Search Disabled
YouTube For Schools Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
Enabled Allow HTTP-tunnelled RTSP stream types String application/x-rtsp-tunnelled N/A Disabled Disabled
Enabled Allow All XML application types Pattern application/*xml* N/A Disabled Disabled
Enabled Allow All application types Pattern application/* N/A Disabled Disabled
Enabled Allow All audio types Pattern audio/* N/A Disabled Disabled
Enabled Allow All font types Pattern font/* N/A Disabled Disabled
Enabled Allow All image types Pattern image/* N/A Disabled Disabled
Enabled Allow All encapsulated message types Pattern message/* N/A Disabled Disabled
Enabled Allow All model types Pattern model/* N/A Disabled Disabled
Enabled Allow All multipart types Pattern multipart/* N/A Disabled Disabled
Enabled Allow All text types Pattern text/* N/A Disabled Disabled
Enabled Allow All video types Pattern video/* N/A Disabled Disabled
Disabled Allow Missing or empty String N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Enabled
Log Disabled
FTP-Client.Standard
Proxy Name [ Proxy Type ] FTP-Client.Standard [ FTP ]
AntiVirus [ Disabled ]
Features Data Loss Prevention [ Disabled ]
APT Blocker [ Disabled ]
Maximum Username Length 64 bytes
Maximum Password Length 32 bytes
Maximum File Name Length 1024 bytes
Maximum Command Line Length 1030 bytes
Maximum Number of Failed Logins Per Connection 6 bytes
Logging For Reports Enabled
Diagnostics Override Level Disabled
Download
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow *.cab Pattern *.cab N/A Disabled Enabled
Enabled Allow *.com Pattern *.com N/A Disabled Enabled
Enabled Allow *.dll Pattern *.dll N/A Disabled Enabled
Enabled Allow *.exe Pattern *.exe N/A Disabled Enabled
Enabled Allow *.zip Pattern *.zip N/A Disabled Enabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
FTP-Client
Proxy Name [ Proxy Type ] FTP-Client [ FTP ]
AntiVirus [ Disabled ]
Features Data Loss Prevention [ Disabled ]
APT Blocker [ Disabled ]
Maximum Username Length 64 bytes
Maximum Password Length 32 bytes
Maximum File Name Length 1024 bytes
Maximum Command Line Length 1030 bytes
Maximum Number of Failed Logins Per Connection 6 bytes
Logging For Reports Disabled
Diagnostics Override Level Disabled
Download
Status Action Name Match Type Value Certificate Alarm Log
Enabled Deny *.cab Pattern *.cab N/A Disabled Enabled
Enabled Deny *.com Pattern *.com N/A Disabled Enabled
Enabled Deny *.dll Pattern *.dll N/A Disabled Enabled
Enabled Deny *.exe Pattern *.exe N/A Disabled Enabled
Enabled Deny *.zip Pattern *.zip N/A Disabled Enabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
FTP-Server.Standard
Proxy Name [ Proxy Type ] FTP-Server.Standard [ FTP ]
AntiVirus [ Disabled ]
Features Data Loss Prevention [ Disabled ]
APT Blocker [ Disabled ]
Maximum Username Length 64 bytes
Maximum Password Length 32 bytes
Maximum File Name Length 1024 bytes
Maximum Command Line Length 1030 bytes
Maximum Number of Failed Logins Per Connection 6 bytes
Logging For Reports Enabled
Diagnostics Override Level Disabled
FTP-Server
Proxy Name [ Proxy Type ] FTP-Server [ FTP ]
AntiVirus [ Disabled ]
Features Data Loss Prevention [ Disabled ]
APT Blocker [ Disabled ]
Maximum Username Length 64 bytes
Maximum Password Length 32 bytes
Maximum File Name Length 1024 bytes
Maximum Command Line Length 1030 bytes
Maximum Number of Failed Logins Per Connection 6 bytes
Logging For Reports Disabled
Diagnostics Override Level Disabled
H.323-Client
Proxy Name [ Proxy Type ] H.323-Client [ H.323 ]
Directory Harvesting Protection Enabled
Maximum Number of Sessions Allowed Per Call Enabled
Rewrite User Agent Disabled
Idle Media Channels 15 minutes
Access Control Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
HTTP-Client.1
Proxy Name [ Proxy Type ] HTTP-Client.1 [ HTTP ]
AntiVirus [ Enabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Disabled ]
WebBlocker [ Enabled - WebBlocker.5 ]
APT Blocker [ Enabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length Disabled
Response Maximum Line Length 4096 bytes
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Enabled [ Logged ]
HTTP-Client.KIOSKPC
Proxy Name [ Proxy Type ] HTTP-Client.KIOSKPC [ HTTP ]
AntiVirus [ Enabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Enabled ]
WebBlocker [ Enabled - WebBlocker.KIOSKPC ]
APT Blocker [ Enabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length 4096 bytes
Response Maximum Line Length 4096 bytes
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Enabled [ Logged ]
Enforce Safe Search Disabled
YouTube For Schools Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
HTTP-Client.Standard.1
Proxy Name [ Proxy Type ] HTTP-Client.Standard.1 [ HTTP ]
AntiVirus [ Enabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Disabled ]
WebBlocker [ Enabled - WebBlocker.5 ]
APT Blocker [ Enabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length Disabled
Response Maximum Line Length 4096 bytes
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Enabled [ Logged ]
Enforce Safe Search Disabled
YouTube For Schools Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
HTTP-Client.Standard
Proxy Name [ Proxy Type ] HTTP-Client.Standard [ HTTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Enabled ]
WebBlocker [ Disabled ]
APT Blocker [ Disabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length 4096 bytes
Response Maximum Line Length 4096 bytes
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Enabled [ Logged ]
Enforce Safe Search Disabled
YouTube For Schools Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
HTTP-Client.Wachter
Proxy Name [ Proxy Type ] HTTP-Client.Wachter [ HTTP ]
AntiVirus [ Enabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Enabled ]
WebBlocker [ Enabled - WebBlocker.MUK ]
APT Blocker [ Enabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length 4096 bytes
Response Maximum Line Length 4096 bytes
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Enabled [ Logged ]
Enforce Safe Search Disabled
YouTube For Schools Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
HTTP-Client
Proxy Name [ Proxy Type ] HTTP-Client [ HTTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Enabled ]
WebBlocker [ Disabled ]
APT Blocker [ Disabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length 2048 bytes
Response Maximum Line Length 4096 bytes
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Enabled [ Logged ]
Enforce Safe Search Disabled
YouTube For Schools Disabled
Logging For Reports Disabled
Diagnostics Override Level Disabled
HTTP-Client_GLG
Proxy Name [ Proxy Type ] HTTP-Client_GLG [ HTTP ]
AntiVirus [ Enabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Disabled ]
WebBlocker [ Disabled ]
APT Blocker [ Enabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length 4096 bytes
Response Maximum Line Length 4096 bytes
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Enabled [ Logged ]
Enforce Safe Search Disabled
YouTube For Schools Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
HTTP-Server.Standard
Proxy Name [ Proxy Type ] HTTP-Server.Standard [ HTTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Enabled ]
WebBlocker [ Disabled ]
APT Blocker [ Disabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length 2048 bytes
Response Maximum Line Length Disabled
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Disabled
Enforce Safe Search Disabled
YouTube For Schools Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
HTTP-Server
Proxy Name [ Proxy Type ] HTTP-Server [ HTTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Enabled ]
WebBlocker [ Disabled ]
APT Blocker [ Disabled ]
Request Connection Idle Timeout 10 minutes
Response Connection Idle Timeout 10 minutes
Request Maximum URL Path Length 2048 bytes
Response Maximum Line Length Disabled
Response Maximum Total Length Disabled
Allow Range Request Through Unmodified Enabled [ Logged ]
Enforce Safe Search Disabled
YouTube For Schools Disabled
Logging For Reports Disabled
Diagnostics Override Level Disabled
HTTP-Virusscan
Proxy Name [ Proxy Type ] HTTP-Virusscan [ HTTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features Reputation Enabled Defense [ Disabled ]
WebBlocker [ Disabled ]
APT Blocker [ Disabled ]
Request Connection Idle Timeout Disabled
Response Connection Idle Timeout Disabled
HTTPS-AVScanner
Proxy Name [ Proxy Type ] HTTPS-AVScanner [ HTTPS ]
Features WebBlocker [ Disabled ]
Connection Idle Timeout Disabled
TLS-Profile TLS-Server-HTTPS.Standard.2
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Disabled
Diagnostics Override Level Disabled
HTTPS-Client.1
Proxy Name [ Proxy Type ] HTTPS-Client.1 [ HTTPS ]
Features WebBlocker [ Enabled - WebBlocker.5 ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Client-HTTPS.Standard.1
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Disabled
Diagnostics Override Level Disabled
Domain Names
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow download.websense.com Pattern download.websense.com N/A Disabled Disabled
Enabled Allow *.knowbe4.com Pattern *.knowbe4.com N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
HTTPS-Client.2
Proxy Name [ Proxy Type ] HTTPS-Client.2 [ HTTPS ]
Features WebBlocker [ Enabled - WebBlocker.5 ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Client-HTTPS.Standard.1
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Disabled
Diagnostics Override Level Disabled
Domain Names
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow download.websense.com Pattern download.websense.com N/A Disabled Disabled
Enabled Allow *.knowbe4.com Pattern *.knowbe4.com N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
HTTPS-Client.KIOSKPC
Proxy Name [ Proxy Type ] HTTPS-Client.KIOSKPC [ HTTPS ]
Features WebBlocker [ Enabled - WebBlocker.KIOSKPC ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Client-HTTPS.Standard
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
Domain Names
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow WatchGuard Services Pattern *.watchguard.com N/A Disabled Disabled
Enabled Allow download.websense.com Pattern download.websense.com N/A Disabled Disabled
Enabled Allow *.knowbe4.com Pattern *.knowbe4.com N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
HTTPS-Client.Standard
Proxy Name [ Proxy Type ] HTTPS-Client.Standard [ HTTPS ]
Features WebBlocker [ Disabled ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Client-HTTPS.Standard
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
Domain Names
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow WatchGuard Services Pattern *.watchguard.com N/A Disabled Disabled
Enabled Allow *.cloudwifi.com Pattern *.cloudwifi.com N/A Disabled Disabled
Enabled Allow redirector.online.spectraguard.net Pattern redirector.online.spectraguard.net N/A Disabled Disabled
Enabled Allow download.websense.com Pattern download.websense.com N/A Disabled Disabled
Enabled Allow *.knowbe4.com Pattern *.knowbe4.com N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
HTTPS-Client.Wachter
Proxy Name [ Proxy Type ] HTTPS-Client.Wachter [ HTTPS ]
Features WebBlocker [ Enabled - WebBlocker.MUK ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Client-HTTPS.Standard
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
Domain Names
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow WatchGuard Services Pattern *.watchguard.com N/A Disabled Disabled
Enabled Allow download.websense.com Pattern download.websense.com N/A Disabled Disabled
Enabled Allow *.knowbe4.com Pattern *.knowbe4.com N/A Disabled Disabled
HTTPS-Client
Proxy Name [ Proxy Type ] HTTPS-Client [ HTTPS ]
Features WebBlocker [ Disabled ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Client-HTTPS.Standard
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Disabled
Diagnostics Override Level Disabled
Domain Names
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow WatchGuard Services Pattern *.watchguard.com N/A Disabled Enabled
Enabled Allow download.websense.com Pattern download.websense.com N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
HTTPS-Client_GLG
Proxy Name [ Proxy Type ] HTTPS-Client_GLG [ HTTPS ]
Features WebBlocker [ Disabled ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Client-HTTPS.Standard
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
Domain Names
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow WatchGuard Services Pattern *.watchguard.com N/A Disabled Disabled
Enabled Allow *.mojonetworks.com Pattern *.mojonetworks.com N/A Disabled Disabled
Enabled Allow *.cloudwifi.com Pattern *.cloudwifi.com N/A Disabled Disabled
Enabled Allow redirector.online.spectraguard.net Pattern redirector.online.spectraguard.net N/A Disabled Disabled
Enabled Allow *.airtightnetworks.com Pattern *.airtightnetworks.com N/A Disabled Disabled
Enabled Allow download.websense.com Pattern download.websense.com N/A Disabled Disabled
Enabled Allow *.knowbe4.com Pattern *.knowbe4.com N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
HTTPS-Server-MobileIron in DMZ
Proxy Name [ Proxy Type ] HTTPS-Server-MobileIron in DMZ [ HTTPS ]
Features WebBlocker [ Disabled ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Server.Standard
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Disabled
Diagnostics Override Level Disabled
Domain Names
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow mdc2 Pattern mdc2.schillseilacher.de N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
HTTPS-Server.Domino.in.DMZ
Proxy Name [ Proxy Type ] HTTPS-Server.Domino.in.DMZ [ HTTPS ]
Features WebBlocker [ Disabled ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Server.Standard
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
Domain Names
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow zum Traveler Pattern traveler.schillseilacher.de N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
HTTPS-Server.Standard
Proxy Name [ Proxy Type ] HTTPS-Server.Standard [ HTTPS ]
Features WebBlocker [ Disabled ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Server-HTTPS.Standard
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Enabled
Diagnostics Override Level Disabled
HTTPS-Server
Proxy Name [ Proxy Type ] HTTPS-Server [ HTTPS ]
Features WebBlocker [ Disabled ]
Connection Idle Timeout 10 minutes
TLS-Profile TLS-Server-HTTPS.Standard
Restrict Google Apps to Allowed Domains Disabled
Logging For Reports Disabled
Diagnostics Override Level Disabled
IMAP-Client.Standard
Proxy Name [ Proxy Type ] IMAP-Client.Standard [ ]
AntiVirus [ Disabled ]
Features spamBlocker [ Disabled ]
Protocol Timeout 1 minute
Maximum Line Length 1000 bytes
TLS-Profile [ TLS-Client.Standard ]
TLS Action [ Allow ]
Log [ Enabled ]
STARTTLS [ Disabled ]
Capabilities TLS-Profile [ TLS-Client.Standard ]
Logging For Reports Enabled
Filename Rules
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow Text files Pattern *.txt N/A Disabled Disabled
Enabled Allow Word documents Pattern *.doc N/A Disabled Disabled
Enabled Allow Excel spreadsheets Pattern *.xls N/A Disabled Disabled
Enabled Allow Missing or empty IPv4 Address N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
IMAP-Server.Standard
Proxy Name [ Proxy Type ] IMAP-Server.Standard [ ]
AntiVirus [ Disabled ]
Features spamBlocker [ Disabled ]
Protocol Timeout 1 minute
Maximum Line Length 1000 bytes
TLS-Profile [ TLS-Server.Standard ]
TLS Action [ Allow ]
Log [ Enabled ]
STARTTLS [ Disabled ]
Capabilities TLS-Profile [ TLS-Server.Standard ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
Filename Rules
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow Text files Pattern *.txt N/A Disabled Disabled
Enabled Allow Word documents Pattern *.doc N/A Disabled Disabled
Enabled Allow Excel spreadsheets Pattern *.xls N/A Disabled Disabled
Enabled Allow Missing or empty IPv4 Address N/A Disabled Disabled
Action to take if no rule above is matched Allow
Certificate N/A
Alarm Disabled
Log Disabled
POP3-Client.Standard
Proxy Name [ Proxy Type ] POP3-Client.Standard [ POP3 ]
AntiVirus [ Disabled ]
Features spamBlocker [ Disabled ]
Protocol Timeout 1 minute
Maximum Line Length 1000 bytes
Hide Server Replies Enabled
Uuencoded Attachments Enabled
BinHex Attachments Enabled
TLS-Profile [ TLS-Client.Standard ]
TLS Action [ Allow ]
Log [ Enabled ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
POP3 Protocol
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow DIGEST-MD5 String DIGEST-MD5 N/A Disabled Disabled
Enabled Allow CRAM-MD5 String CRAM-MD5 N/A Disabled Disabled
Enabled Allow PLAIN String PLAIN N/A Disabled Disabled
Enabled Allow NTLM String NTLM N/A Disabled Disabled
Enabled Allow LOGIN String LOGIN N/A Disabled Disabled
Enabled Allow GSSAPI String GSSAPI N/A Disabled Disabled
Enabled Allow KERBEROS_V4 String KERBEROS_V4 N/A Disabled Disabled
Action to take if no rule above is matched Deny
Certificate N/A
Alarm Enabled
Log Disabled
POP3-Client
Proxy Name [ Proxy Type ] POP3-Client [ POP3 ]
AntiVirus [ Disabled ]
Features spamBlocker [ Disabled ]
Protocol Timeout 1 minute
Maximum Line Length 1000 bytes
Hide Server Replies Enabled
Uuencoded Attachments Disabled
BinHex Attachments Disabled
TLS-Profile [ TLS-Client.Standard ]
TLS Action [ Allow ]
Log [ Enabled ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
POP3 Protocol
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow DIGEST-MD5 String DIGEST-MD5 N/A Disabled Disabled
Enabled Allow CRAM-MD5 String CRAM-MD5 N/A Disabled Disabled
Enabled Allow PLAIN String PLAIN N/A Disabled Disabled
Enabled Allow NTLM String NTLM N/A Disabled Disabled
Enabled Allow LOGIN String LOGIN N/A Disabled Disabled
Enabled Allow GSSAPI String GSSAPI N/A Disabled Disabled
Enabled Allow KERBEROS_V4 String KERBEROS_V4 N/A Disabled Disabled
Action to take if no rule above is matched Deny
Certificate N/A
Alarm Enabled
Log Disabled
POP3-Server.Standard
Proxy Name [ Proxy Type ] POP3-Server.Standard [ POP3 ]
AntiVirus [ Disabled ]
Features spamBlocker [ Disabled ]
Protocol Timeout 1 minute
Maximum Line Length 1000 bytes
Hide Server Replies Enabled
Uuencoded Attachments Enabled
BinHex Attachments Enabled
TLS-Profile [ TLS-Server.Standard ]
TLS Action [ Allow ]
Log [ Enabled ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
POP3 Protocol
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow DIGEST-MD5 String DIGEST-MD5 N/A Disabled Disabled
Enabled Allow CRAM-MD5 String CRAM-MD5 N/A Disabled Disabled
Enabled Allow PLAIN String PLAIN N/A Disabled Disabled
Enabled Allow NTLM String NTLM N/A Disabled Disabled
Enabled Allow LOGIN String LOGIN N/A Disabled Disabled
Enabled Allow GSSAPI String GSSAPI N/A Disabled Disabled
Enabled Allow KERBEROS_V4 String KERBEROS_V4 N/A Disabled Disabled
Action to take if no rule above is matched Deny
Certificate N/A
Alarm Enabled
Log Disabled
POP3-Server
Proxy Name [ Proxy Type ] POP3-Server [ POP3 ]
AntiVirus [ Disabled ]
Features spamBlocker [ Disabled ]
Protocol Timeout 1 minute
Maximum Line Length 1000 bytes
Hide Server Replies Enabled
Uuencoded Attachments Disabled
BinHex Attachments Disabled
TLS-Profile [ TLS-Server.Standard ]
TLS Action [ Allow ]
Log [ Enabled ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
POP3 Protocol
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow DIGEST-MD5 String DIGEST-MD5 N/A Disabled Disabled
Enabled Allow CRAM-MD5 String CRAM-MD5 N/A Disabled Disabled
Enabled Allow PLAIN String PLAIN N/A Disabled Disabled
Enabled Allow NTLM String NTLM N/A Disabled Disabled
Enabled Allow LOGIN String LOGIN N/A Disabled Disabled
Enabled Allow GSSAPI String GSSAPI N/A Disabled Disabled
Enabled Allow KERBEROS_V4 String KERBEROS_V4 N/A Disabled Disabled
Action to take if no rule above is matched Deny
Certificate N/A
Alarm Enabled
Log Disabled
SIP-Client
Proxy Name [ Proxy Type ] SIP-Client [ SIP ]
Header Normalization Enabled
Topology Hiding Enabled
Directory Harvesting Protection Enabled
Rewrite User Agent Disabled
Idle Media Channels 15 minutes
Registration Expiration 15 minutes
Logging For Reports Enabled
Diagnostics Override Level Disabled
SMTP-Incoming.Standard
Proxy Name [ Proxy Type ] SMTP-Incoming.Standard [ SMTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features spamBlocker [ Disabled ]
APT Blocker [ Disabled ]
Connection Idle Timeout 10 minutes
Maximum Email Recipients 99
Maximum Address Length Disabled
Maximum Email Size 20000 kilobytes
Maximum Email Line Length 1000 bytes
Maximum Email Header Size Disabled
Message ID Disabled
Server Replies Enabled
Uuencoded Attachments Enabled
BinHex Attachments Enabled
Auto-block Source of Invalid Commands Disabled
Send Log Message when an SMTP Command is Denied Disabled
TLS-Profile [ TLS-Server.Standard ]
SMTPS Action [ Allow ]
Log [ Enabled ]
ESMTP [ Enabled ]
ESMTP STARTTLS [ Disabled ]
TLS-Profile [ TLS-Server.Standard ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
SMTP-Incoming.SuS
Proxy Name [ Proxy Type ] SMTP-Incoming.SuS [ SMTP ]
AntiVirus [ Enabled ]
Data Loss Prevention [ Disabled ]
Features spamBlocker [ Disabled ]
APT Blocker [ Enabled ]
Connection Idle Timeout Disabled
Maximum Email Recipients 999
Maximum Address Length Disabled
Maximum Email Size 40000 kilobytes
Maximum Email Line Length 1000 bytes
Maximum Email Header Size 20000 bytes
Message ID Disabled
Server Replies Enabled
Uuencoded Attachments Enabled
BinHex Attachments Enabled
Auto-block Source of Invalid Commands Disabled
Send Log Message when an SMTP Command is Denied Enabled
TLS-Profile [ TLS-Server.Standard ]
SMTPS Action [ Allow ]
Log [ Enabled ]
ESMTP [ Enabled ]
ESMTP STARTTLS [ Disabled ]
TLS-Profile [ TLS-Server.Standard ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
SMTP-Incoming
Proxy Name [ Proxy Type ] SMTP-Incoming [ SMTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features spamBlocker [ Disabled ]
APT Blocker [ Disabled ]
Connection Idle Timeout 10 minutes
Maximum Email Recipients 99
Maximum Address Length Disabled
Maximum Email Size 10000 kilobytes
Maximum Email Line Length 1000 bytes
Maximum Email Header Size Disabled
Message ID Disabled
Server Replies Enabled
Uuencoded Attachments Disabled
BinHex Attachments Disabled
Auto-block Source of Invalid Commands Disabled
Send Log Message when an SMTP Command is Denied Disabled
TLS-Profile [ TLS-Server.Standard ]
SMTPS Action [ Allow ]
Log [ Enabled ]
ESMTP [ Enabled ]
ESMTP STARTTLS [ Disabled ]
TLS-Profile [ TLS-Server.Standard ]
Logging For Reports Disabled
Diagnostics Override Level Disabled
SMTP-Outgoing.Standard
Proxy Name [ Proxy Type ] SMTP-Outgoing.Standard [ SMTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features spamBlocker [ Disabled ]
APT Blocker [ Disabled ]
Connection Idle Timeout 10 minutes
Maximum Email Recipients Disabled
Maximum Address Length Disabled
Maximum Email Size 20000 kilobytes
Maximum Email Line Length 1000 bytes
Maximum Email Header Size Disabled
Message ID Disabled
Server Replies Enabled
SMTP-Outgoing.SuS
Proxy Name [ Proxy Type ] SMTP-Outgoing.SuS [ SMTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features spamBlocker [ Disabled ]
APT Blocker [ Enabled ]
Connection Idle Timeout 10 minutes
Maximum Email Recipients Disabled
Maximum Address Length Disabled
Maximum Email Size 20000 kilobytes
Maximum Email Line Length 1000 bytes
Maximum Email Header Size 20000 bytes
Message ID Disabled
Server Replies Enabled
Uuencoded Attachments Enabled
BinHex Attachments Enabled
Auto-block Source of Invalid Commands Disabled
Send Log Message when an SMTP Command is Denied Disabled
TLS-Profile [ TLS-Client.Standard ]
SMTPS Action [ Allow ]
Log [ Enabled ]
ESMTP [ Enabled ]
ESMTP STARTTLS [ Disabled ]
TLS-Profile [ TLS-Client.Standard ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
SMTP-Outgoing
Proxy Name [ Proxy Type ] SMTP-Outgoing [ SMTP ]
AntiVirus [ Disabled ]
Data Loss Prevention [ Disabled ]
Features spamBlocker [ Disabled ]
APT Blocker [ Disabled ]
Connection Idle Timeout 10 minutes
Maximum Email Recipients Disabled
Maximum Address Length Disabled
Maximum Email Size 10000 kilobytes
Maximum Email Line Length 1000 bytes
Maximum Email Header Size Disabled
Message ID Disabled
Server Replies Enabled
Uuencoded Attachments Disabled
BinHex Attachments Disabled
Auto-block Source of Invalid Commands Disabled
Send Log Message when an SMTP Command is Denied Disabled
TLS-Profile [ TLS-Client.Standard ]
SMTPS Action [ Allow ]
Log [ Enabled ]
ESMTP [ Enabled ]
ESMTP STARTTLS [ Disabled ]
TLS-Profile [ TLS-Client.Standard ]
Logging For Reports Disabled
Diagnostics Override Level Disabled
TCP-UDP-Proxy.Standard
Proxy Name [ Proxy Type ] TCP-UDP-Proxy.Standard [ TCP-UDP-Proxy ]
HTTP [ HTTP-Client.Standard ]
HTTPS [ HTTPS-Client.Standard ]
Traffic Redirection SIP [ SIP-Client ]
Traffic [ Proxy ] FTP [ FTP-Client.Standard ]
IMAP [ IMAP-Client.Standard ]
Other Protocols [ Allow ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
TCP-UDP-Proxy
Proxy Name [ Proxy Type ] TCP-UDP-Proxy [ TCP-UDP-Proxy ]
HTTP [ HTTP-Client ]
HTTPS [ HTTPS-Client ]
Traffic Redirection SIP [ SIP-Client ]
Traffic [ Proxy ] FTP [ FTP-Client ]
IMAP [ IMAP-Client.Standard ]
Other Protocols [ Allow ]
Logging For Reports Enabled
Diagnostics Override Level Disabled
HTTP-Content.Standard
Content Rules
Content Action to take if no rule above is matched
Redirected Action HTTP-Server.Standard
Alarm Disabled
Log Enabled
SSL Offloading Disabled
HTTP Port 80
TLS Port 443
TLS-Client.Standard
Minimum Protocol OCSP Verification PFS TLS Compliance
TLS v1.0 Disabled Allowed Not enforced
TLS-Server.Standard
Minimum Protocol OCSP Verification PFS TLS Compliance
TLS v1.0 N/A Allowed Enforced
TLS-Client-HTTPS.Standard
Minimum Protocol OCSP Verification PFS TLS Compliance
TLS v1.0 Strict Allowed Not enforced
TLS-Server-HTTPS.Standard
Minimum Protocol OCSP Verification PFS TLS Compliance
TLS v1.0 N/A Allowed Not enforced
TLS-Client-HTTPS.Standard.1
Minimum Protocol OCSP Verification PFS TLS Compliance
TLS v1.0 Strict None Not enforced
TLS-Server-HTTPS.Standard.1
Minimum Protocol OCSP Verification PFS TLS Compliance
TLS v1.0 N/A None Not enforced
TLS-Server-HTTPS.Standard.2
Minimum Protocol OCSP Verification PFS TLS Compliance
TLS v1.0 N/A None Enforced
Policies
Disabled
Interfaces
Interface Settings
Interfaces Bandwidth
Cluster_Interface Link Speed
DMZ-WLAN Link Speed
IPPhone Link Speed
Optional-10 Link Speed
Optional-11 Link Speed
Optional-12 Link Speed
Optional-13 Link Speed
Optional-14 Link Speed
Optional-15 Link Speed
Optional-16 Link Speed
Optional-17 Link Speed
Optional-18 Link Speed
Optional-2 Link Speed
Optional-8 Link Speed
Optional-9 Link Speed
S+S DMZ Link Speed
S+S LAN Link Speed
SuS_Labor Link Speed
T-Com_WAN Link Speed
Uplink-Core Link Speed
2-9 Scheduling
Schedules
Name
Always On
MF 0700-1900
Scheduling Policies
Policy Name Schedule
VPN-iPhoneDNS Always On
Tunnel-MFA-AlcatelTelefon Always On
Tunnel-AlcatelTelefon.1 Always On
VPN-DiehlES-Any Always On
VPN-DiehlK-Any Always On
VPN-Extern-MFA-Any Always On
Bechtle-IPSEC-Any Always On
BEOS-IPSEC-Any Always On
VPN-iPhone-Any Always On
VPN-Benutzer-Any Always On
Olschewski-Any Always On
Service-Partner-Any Always On
VPN-Bilgram-Any Always On
Tunnel-RDP Always On
Tunnel-DNS Always On
Tunnel-DHCP-Server Always On
Tunnel-AlcatelTelefon Always On
Tunnel-Https-SW-Netz Always On
Tunnel-Addison-Ports Always On
Tunnel-SSH Always On
Tunnel-Tunnel Domino01 Port Always On
Tunnel-OPAL_Lizens_Port.1 Always On
VPN-Benutzer-MFA-Any Always On
Tunnel-MFA-RDP.1 Always On
Tunnel-MFA-DNS Always On
Tunnel-MFA-DHCP-Server Always On
Tunnel-MFA-Addison-Ports Always On
Tunnel-MFA-SSH Always On
Tunnel-OPAL_Lizens_Port Always On
SSH.2 Always On
SSH.1 Always On
TFTP.1 Always On
SNMP.2 Always On
SNMP Always On
SNMP.1 Always On
NTP.1 Always On
Exchange365 Always On
Access Always On
Access.1 Always On
BOVPN-Allow.out Always On
Dakoso_Vpn.out Always On
Lobster_VPN.out Always On
SAP_VPN_Nagarro_.out Always On
TEN-IT_VPN_DATA_DOMAIN.out Always On
Any_fuer_PC131-10_PC061_PC151 Always On
Innerhalb SuS alles frei Always On
Any_fuer_GLG Always On
Any_On_Way_Labor Always On
Ports_Data_Domain_Rep Always On
FTP Always On
SFTP Always On
SSH_zum_Finanzamt Always On
SFTP zu Eckardt Always On
SFTP zu Dakosy Always On
SSH Always On
SSH zu DMZ Always On
BOVPN-Allow.in Always On
2-10 SNAT
SNAT
Name Type Description
9997 MobIron SNAT client sync traffic
Alarmserver SNAT
Exchange365 SNAT
HTTPS_Webmailer.1.snat SNAT
HTTP_TCOM_Webmailer.snat SNAT
HTTP_WAN_Webmailer.1.snat SNAT
Nat tcom Sentry SNAT
PRTG SNAT
SMTP-Retarus-Loadbalancing SLB IP Sprayer fuer SMTP
SMTP_in.1.snat SNAT
SMTP_in_Tcom.snat SNAT
http 8080 mobiron SNAT
https mobiron SNAT
https sentry SNAT
nat Tcom MobIron SNAT
nat auf domino03 SNAT
SNAT Details
9997 MobIron
Type Static NAT
Description client sync traffic
Any-External --> 192.168.200.20
Members Set Source IP: Disabled
Alarmserver
Type Static NAT
Description
80.156.231.138 --> 172.17.1.5
Members Set Source IP: Disabled
Exchange365
Type Static NAT
Description
80.156.231.138 --> 172.17.0.103
Members Set Source IP: Disabled
HTTPS_Webmailer.1.snat
Type Static NAT
Description
Any-External --> 192.168.200.15
Members Set Source IP: Disabled
HTTP_TCOM_Webmailer.snat
Type Static NAT
Description
80.156.231.140 --> 192.168.200.15
Members Set Source IP: Disabled
HTTP_WAN_Webmailer.1.snat
Type Static NAT
Description
Any-External --> 192.168.200.15
Members Set Source IP: Disabled
PRTG
Type Static NAT
Description
80.156.231.138 --> :443
Members Set Source IP: Disabled
SMTP-Retarus-Loadbalancing
Type Server Load Balancing
Description IP Sprayer fuer SMTP
Method Least Connection
Enable sticky connection 8 hours
80.156.231.138 --> 172.17.0.2 [1]
Set Source IP: Disabled
Members 80.156.231.138 --> 172.17.0.43 [2]
Set Source IP: Disabled
SMTP_in.1.snat
Type Static NAT
Description
Any-External --> 172.17.0.2
Members Set Source IP: Disabled
SMTP_in_Tcom.snat
Type Static NAT
Description
80.156.231.138 --> 172.17.0.2
Members Set Source IP: Disabled
https mobiron
Type Static NAT
Description
Any-External --> 192.168.200.20
Members Set Source IP: Disabled
https sentry
Type Static NAT
Description
Any-External --> 192.168.200.21
Members Set Source IP: Disabled
Dangerous Activities
Drop Spoofing Attacks Enabled
Drop IP Source Route Enabled
Block Port Sp dace Probes 10 dest Ports/src IP (threshold)
Block Address Space Probes 10 dest IPs/src IP (threshold)
Drop IPSEC Flood Attack 1500 packets/sec (threshold)
Drop IKE Flood Attack 1000 packets/sec (threshold)
Drop ICMP Flood Attack 1000 packets/sec (threshold)
Drop SYN Flood Attack 5000 packets/sec (threshold)
Drop UDP Flood Attack 1000 packets/sec (threshold)
Unhandled Packets
Auto-block source of packets not handled Disabled
Send an error message to clients whose connections are disabled Disabled
Blocked Sites
Blocked Sites
Duration For Auto-Blocked Sites 20 minutes
download.websense.com
Description: Default exception for WebBlocker server database
*.dnswatch.watchguard.com
Description: Default exception for WatchGuard Services
*.strongarm.io
Description: Default exception for WatchGuard Services
54.174.40.213
Description: DNS Service
52.3.100.184
Description: DNS Service
54.199.61.196
Description: DNS Service
176.34.8.52
Description: DNS Service
34.240.115.208
Description: DNS Service
34.251.171.117
Description: DNS Service
13.237.104.38
Description: DNS Service
13.237.109.176
Description: DNS Service
Blocked Address Exception
52.215.192.68
Description: DNS Service
52.215.192.69
Description: DNS Service
54.173.101.99
Description: Black Hole
*.pandasecurity.com
Description: Default exception for Panda products and services
aether100proservicebus.servicebus.windows.net
Description: Default exception for Panda products and services
aether100pronotification.table.core.windows.net
Description: Default exception for Panda products and services
content.ivanti.com
Description: Default exception for Panda products and services
*.globalsign.net
Description: Default exception for Panda products and services
*.globalsign.com
Description: Default exception for Panda products and services
*.digicert.com
Description: Default exception for Panda products and services
*.ctmail.com
Description: Default exception for Panda products and services
Blocked Ports
Blocked Ports
Automatically block sites that
Disabled
try to use blocked ports
1
111
513
514
2049
6000
Blocked Ports 6001
6002
6003
6004
6005
7100
8000
2-14 Quotas
Disabled
3. Subscription Services
VPN-iPhoneDNS None
Tunnel-MFA-AlcatelTelefon Global
Tunnel-AlcatelTelefon.1 None
VPN-DiehlES-Any None
VPN-DiehlK-Any None
VPN-Extern-MFA-Any None
Bechtle-IPSEC-Any None
BEOS-IPSEC-Any Global
VPN-iPhone-Any None
VPN-Benutzer-Any None
Olschewski-Any None
Service-Partner-Any None
VPN-Bilgram-Any None
Tunnel-RDP None
Tunnel-DNS Global
Tunnel-DHCP-Server Global
Tunnel-AlcatelTelefon Global
Tunnel-Https-SW-Netz Global
Tunnel-Addison-Ports Global
Tunnel-SSH Global
Tunnel-Tunnel Domino01 Port Global
Tunnel-OPAL_Lizens_Port.1 Global
VPN-Benutzer-MFA-Any Global
Tunnel-MFA-RDP.1 Global
Tunnel-MFA-DNS Global
Tunnel-MFA-DHCP-Server Global
Tunnel-MFA-Addison-Ports Global
Tunnel-MFA-SSH Global
Tunnel-OPAL_Lizens_Port Global
SSH.2 None
SSH.1 None
TFTP.1 None
SNMP.2 None
SNMP None
SNMP.1 None
NTP.1 None
Exchange365 Global
Access None
Access.1 None
BOVPN-Allow.out None
Dakoso_Vpn.out None
Lobster_VPN.out None
SAP_VPN_Nagarro_.out None
TEN-IT_VPN_DATA_DOMAIN.out None
Any_fuer_PC131-10_PC061_PC151 None
Innerhalb SuS alles frei None
Any_fuer_GLG None
Any_On_Way_Labor None
Ports_Data_Domain_Rep None
FTP None
SFTP Global
SSH_zum_Finanzamt None
SFTP zu Eckardt None
SFTP zu Dakosy None
SSH None
SSH zu DMZ None
SSH-8443 DELL None
SSH DELL Compellent None
Barcodescanner_Telnet None
CMN-DO02 None
Alarm-Server Port None
SMTP-in-proxy None
SMTP-Ferarri-Fax None
SMTP_in None
SMTP_DMZ_zu_LAN None
SMTP-out-proxy None
SMTP_Out None
SMTP_dmzWLAN None
DHCP-Server None
TFTP None
WatchGuard AcssesPortal SSLVPN Global
Luja_PNA_Ports None
HTTP_DMZ_LAN None
HTTP_zu_DMZ None
HTTP in T Webmailer None
HTTP_dmzWLAN_intranet None
HTTP-proxy.GLG None
HTTP-Kiosk_zu_Intranet None
HTTP-proxy-Wachter None
HTTP-proxy-KIOSKPC None
HTTP-proxy None
HTTP-Deny None
POP3_dmzWLAN None
IMAP_dmzWLAN None
SNMP-von DESSBLX022 None
Z39-50_SciFinder None
DMZ-AD-Anbindung Global
LDAP fuer DMZ None
Helpdesk-Port Global
HTTPS-in-140-DMZ None
HTTPS-proxy-AV.Webmailer None
HTTPS in T Webmailer None
HTTPS-in-141-DMZ None
HTTPS in Mobileiron None
HTTPS Sentry in None
HTTPS mobileiron.com Global
HTTPS-proxy_GLG None
HTTPS-DMZ-LAN None
HTTPS_dmzWLAN None
HTTPS_ESRS None
HTTPS-proxy.Wachter None
HTTPS-proxy-KIOSKPC None
HTTPS-proxy None
HTTPS_ESX_SC_Support_Assistent None
CWS Repair APP Port 2403 None
HTTPS-Deny None
SMTP-SSL_dmzWLAN None
IMAP-SSL_dmzWLAN None
3-2 WebBlocker
WebBlocker Servers
Disabled
WebBlocker Global Exceptions
Status Action Name Match Type Value Certificate Alarm Log
Enabled Allow WatchGuard Regular Expression ^[0-9a-zA-Z_\-.]{1,256}\.watchguard\.com/ N/A Disabled Disabled
Enabled Allow Panda Security Pattern *.pandasecurity.com/* N/A Disabled Enabled
Enabled Allow Panda Security (Services) Pattern aether100proservicebus.servicebus.windows.net/* N/A Disabled Enabled
Enabled Allow Panda Security (Notifications) Pattern aether100pronotification.table.core.windows.net/* N/A Disabled Enabled
Enabled Allow Panda Security (Path Management) Pattern content.ivanti.com/* N/A Disabled Enabled
Enabled Allow globalsign.net Pattern *.globalsign.net/* N/A Disabled Enabled
Enabled Allow globalsign.com Pattern *.globalsign.com/* N/A Disabled Enabled
Enabled Allow digicert.com Pattern *.digicert.com/* N/A Disabled Enabled
Enabled Allow ctmail.com Pattern *.ctmail.com/* N/A Disabled Enabled
Action to take if no rule above is matched
Certificate N/A
Alarm Disabled
Log Disabled
WebBlocker Actions
WebBlocker Actions
WebBlocker.5
WebBlocker.6 (not used)
WebBlocker.KIOSKPC
WebBlocker.MUK
WebBlocker Action
WebBlocker Action WebBlocker.5
WebBlocker Server Webblocker Cloud
Adult Content
Adult Material
Advanced Malware Command and Control
Bot Networks
Compromised Websites
Dynamic DNS
Elevated Exposure
Emerging Exploits
Extended Protection
Gambling
Games
Gay or Lesbian or Bisexual Interest
Deny Categories Illegal or Questionable
Instant Messaging
Keyloggers
Malicious Embedded Link
Malicious Embedded iFrame
Malicious Web Sites
Mobile Malware
Nudity
Pay-to-Surf
Peer-to-Peer File Sharing
Personals and Dating
Phishing and Other Frauds
Potentially Unwanted Software
Proxy Avoidance
Security
Sex
Sex Education
Social Web - Facebook
Social Web - Twitter
Spyware
Streaming Media
Suspicious Content
Suspicious Embedded Link
Tasteless
Unauthorized Mobile Marketplaces
Violence
Web Chat
Website Translation
Warn Categories No Category Selected
Default Action Allow
name: WatchGuard
pattern: *.watchguard.com/*
allow
log: false
name: WB Rule 1
pattern: *babelfish.altavista.com*/*
allow
log: false
name: WB Rule 2
pattern: *Kirche-im-SWR.de/*
allow
log: false
name: WB Rule 3
pattern: *.lotto*.de/*
allow
log: false
name: WB Rule 4
pattern: *.dereferer.org/*
allow
log: false
name: WB Rule 5
pattern: *.healthmegamall.com/*
allow
log: false
name: WB Rule 6
pattern: chemreg-border.epa.gov.tw/*
allow
log: false
name: EMC
pattern: *.emc.com/*
allow
log: false
name: Contibridge
pattern: *.contibridge.*/*
allow
log: false
name: linkedin
pattern: *.linkedin.*/*
allow
log: false
name: daserste
pattern: *.daserste.*/*
allow
log: false
name: Whatsapp
pattern: *.whatsapp.net/*
allow
log: false
name: vca-savethedate-nutcracker2018-b
pattern: *.vca-savethedate-nutcracker2018.com*/*
WebBlocker Exceptions allow
log: false
name: vca-savethedate-nutcracker2018
pattern: *.vca-savethedate-nutcracker2018.*/*
allow
log: false
name: onetoone.de
pattern: *.onetoone.de/*
allow
log: false
name: onetoone.de2
pattern: onetoone.de/*
allow
log: false
name: Vimeo1
pattern: *.vimeo.*/*
allow
log: false
name: Vimeo2
pattern: vimeo.*/*
allow
log: false
name: Vimeo3
pattern: *.vimeo*.*/*
allow
log: false
name: gotomeeting
pattern: *.transcripts.gotomeeting.com/*
allow
log: false
name: gotomeeting2
pattern: ssl.p.jwpcdn.com/*
allow
log: false
name: leatherbiz
pattern: leatherbiz.*/*
allow
log: false
name: MobileIron
pattern: *.mobileiron.com/*
allow
log: false
name: Apple
pattern: *.apple.com/*
allow
log: false
name: analytik
pattern: *.analytik.de/*
allow
log: true
name: bigmarker
pattern: *.bigmarker.*/*
allow
log: false
name: streamlock
pattern: *.streamlock.*/*
allow
log: true
name: http://intertek-cdn.s3.amazonaws.com/
pattern: *.intertek-cdn.s3.amazonaws.com/*
allow
log: true
name: .tawk.to
pattern: *.tawk.to/*
allow
log: false
name: exammi.de
pattern: .exammi.*/*
allow
log: false
name: edudip.com
pattern: *.edudip.*/*
allow
log: true
alarm: WebBlocker.5-ph
name: Outlook
pattern: *.protection.outlook.com/*
allow
log: true
alarm: WebBlocker.5-ph
name: Mail.outlook
pattern: */*.mail.protection.outlook.com/*
allow
log: true
alarm: WebBlocker.5-ph
name: onMicrosoft
pattern:
autodiscover.schillseilacher0365.onmicrosoft.com/*
allow
log: true
alarm: WebBlocker.5-ph
name: dacoso-portal.atlassian.net
pattern: *.dacoso-portal.atlassian.net/*
allow
log: true
name: fbi.de
pattern: *.fbi.de/*
allow
log: false
name: store.steampowered.com
pattern: *.steampowered.*/*
allow
log: false
Default:
- if no match, use category list to determine
accessibility
Network Errors
Newly Registered Websites
News and Media
Non-Traditional Religions
Nudity
Nutrition
Online Brokerage and Trading
Organizational Email
Parked Domain
Pay-to-Surf
Peer-to-Peer File Sharing
Personal Network Storage and Backup
Personals and Dating
Phishing and Other Frauds
Political Organizations
Potentially Unwanted Software
Prescribed Medications
Private IP Addresses
Pro-Choice
Pro-Life
Productivity
Professional and Worker Organizations
Proxy Avoidance
Real Estate
Reference Materials
Religion
Restaurants and Dining
Search Engines and Portals
Security
Service and Philanthropic Organizations
Sex
Sex Education
Shopping
Social Networking
Social Organizations
Social Web - Facebook
Social Web - LinkedIn
Social Web - Twitter
Social Web - YouTube
Social and Affiliation Organizations
Society and Lifestyles
Special Events
Sport Hunting and Gun Clubs
Sports
Spyware
Streaming Media
Surveillance
Suspicious Content
Suspicious Embedded Link
Tasteless
Text and Media Messaging
Traditional Religions
Travel
Unauthorized Mobile Marketplaces
Vehicles
Violence
Viral Video
Weapons
Web Analytics
Web Chat
Web Collaboration
Web Hosting
Web Images
Web Infrastructure
Web and Email Marketing
Web and Email Spam
Website Translation
Warn Categories No Category Selected
Default Action Allow
name: WatchGuard
pattern: *.watchguard.com/*
allow
log: false
name: SAM-Secova
WebBlocker Exceptions pattern: *.secova.*/*
allow
log: false
Default:
- if no match, use category list to determine
accessibility
name: WB Rule 1
pattern: *babelfish.altavista.com*/*
allow
log: false
name: WB Rule 2
WebBlocker Exceptions pattern: *Kirche-im-SWR.de/*
allow
log: false
name: WB Rule 3
pattern: *.lotto*.de/*
allow
log: false
name: WB Rule 4
pattern: *.dereferer.org/*
allow
log: false
name: WB Rule 5
pattern: *.healthmegamall.com/*
allow
log: false
name: WB Rule 6
pattern: chemreg-border.epa.gov.tw/*
allow
log: false
name: EMC
pattern: *.emc.com/*
allow
log: false
name: Contibridge
pattern: *.contibridge.*/*
allow
log: false
name: linkedin
pattern: *.linkedin.*/*
allow
log: false
name: daserste
pattern: *.daserste.*/*
allow
log: false
name: Whatsapp
pattern: *.whatsapp.net/*
allow
log: false
name: vca-savethedate-nutcracker2018-b
pattern: *.vca-savethedate-
nutcracker2018.com*/*
allow
log: false
name: vca-savethedate-nutcracker2018
pattern: *.vca-savethedate-nutcracker2018.*/*
allow
log: false
name: onetoone.de
pattern: *.onetoone.de/*
allow
log: false
name: onetoone.de2
pattern: onetoone.de/*
allow
log: false
name: Vimeo1
pattern: *.vimeo.*/*
allow
log: false
name: Vimeo2
pattern: vimeo.*/*
allow
log: false
name: Vimeo3
pattern: *.vimeo*.*/*
allow
log: false
name: gotomeeting
pattern: *.transcripts.gotomeeting.com/*
allow
log: false
name: gotomeeting2
pattern: ssl.p.jwpcdn.com/*
allow
log: false
name: leatherbiz
pattern: leatherbiz.*/*
allow
log: false
name: MobileIron
pattern: *.mobileiron.com/*
allow
log: false
name: Apple
pattern: *.apple.com/*
allow
log: false
name: analytik
pattern: *.analytik.de/*
allow
log: true
name: bigmarker
pattern: *.bigmarker.*/*
allow
log: false
name: streamlock
pattern: *.streamlock.*/*
allow
log: true
name: http://intertek-cdn.s3.amazonaws.com/
pattern: *.intertek-cdn.s3.amazonaws.com/*
allow
log: true
name: .tawk.to
pattern: *.tawk.to/*
allow
log: false
name: exammi.de
pattern: .exammi.*/*
allow
log: false
name: edudip.com
pattern: *.edudip.*/*
allow
log: true
Default:
- if no match, use category list to determine
accessibility
3-3 spamBlocker
spamBlocker
Maximum file size to scan 100 KB
General Settings
Server region ANY
Contact the spamBlocker server using an HTTP proxy server Disabled
Server address
Server port 8080
HTTP Proxy Server
Server authentication No Authentication
User domain None
User Name None
3-4 Gateway AV
3-5 IntelligentAV
Disabled
Geolocation Blocking
Global
Africa
Antarctica
Asia
Europe
North America
Oceania
South America
3-7 IPS
Scan Mode
Full Scan Fast Scan
✓
Threat Actions
Threat Level Action Alarm Log
Critical Block Enabled Enabled
High Block Enabled Enabled
Medium Block Enabled Enabled
Low Allow Enabled Enabled
Info Allow Disabled Disabled
Exchange365 Enabled
Access Enabled
Access.1 Enabled
BOVPN-Allow.out Enabled
Dakoso_Vpn.out Enabled
Lobster_VPN.out Enabled
SAP_VPN_Nagarro_.out Enabled
TEN-IT_VPN_DATA_DOMAIN.out Enabled
Any_fuer_PC131-10_PC061_PC151 Enabled
Innerhalb SuS alles frei Enabled
Any_fuer_GLG Enabled
Any_On_Way_Labor Enabled
Ports_Data_Domain_Rep Enabled
FTP Enabled
SFTP Enabled
SSH_zum_Finanzamt Enabled
SFTP zu Eckardt Enabled
SFTP zu Dakosy Enabled
SSH Disabled
SSH zu DMZ Enabled
SSH-8443 DELL Enabled
SSH DELL Compellent Enabled
Barcodescanner_Telnet Enabled
CMN-DO02 Enabled
Alarm-Server Port Enabled
SMTP-in-proxy Disabled
SMTP-Ferarri-Fax Enabled
SMTP_in Disabled
SMTP_DMZ_zu_LAN Disabled
SMTP-out-proxy Disabled
SMTP_Out Disabled
SMTP_dmzWLAN Disabled
DHCP-Server Disabled
TFTP Disabled
WatchGuard AcssesPortal SSLVPN Enabled
Luja_PNA_Ports Enabled
HTTP_DMZ_LAN Enabled
HTTP_zu_DMZ Enabled
HTTP in T Webmailer Enabled
HTTP_dmzWLAN_intranet Enabled
HTTP-proxy.GLG Enabled
HTTP-Kiosk_zu_Intranet Enabled
HTTP-proxy-Wachter Enabled
HTTP-proxy-KIOSKPC Enabled
HTTP-proxy Enabled
HTTP-Deny Enabled
POP3_dmzWLAN Enabled
IMAP_dmzWLAN Enabled
SNMP-von DESSBLX022 Disabled
Z39-50_SciFinder Enabled
DMZ-AD-Anbindung Enabled
LDAP fuer DMZ Enabled
Helpdesk-Port Enabled
HTTPS-in-140-DMZ Enabled
HTTPS-proxy-AV.Webmailer Enabled
HTTPS in T Webmailer Enabled
HTTPS-in-141-DMZ Enabled
HTTPS in Mobileiron Enabled
HTTPS Sentry in Enabled
HTTPS mobileiron.com Enabled
HTTPS-proxy_GLG Enabled
HTTPS-DMZ-LAN Enabled
HTTPS_dmzWLAN Enabled
HTTPS_ESRS Enabled
HTTPS-proxy.Wachter Enabled
HTTPS-proxy-KIOSKPC Enabled
HTTPS-proxy Enabled
HTTPS_ESX_SC_Support_Assistent Enabled
CWS Repair APP Port 2403 Enabled
HTTPS-Deny Enabled
SMTP-SSL_dmzWLAN Disabled
IMAP-SSL_dmzWLAN Enabled
OpenVPN Port 1194 Enabled
Gast-Wlan-Port 8443 Enabled
Groupwise_in Enabled
Groupwise_out Enabled
Barcodescanner_Lizenzserver Enabled
HBCI_fuer_SFirm Enabled
SRP BlackBerry Enabled
RDP Enabled
HTTPS zu DMZ Enabled
WatchGuard Authentication Enabled
WatchGuard Certificate Portal Enabled
Apple APN Port 5223 Enabled
Google C2DM Port 5228 Enabled
ManageEngine Port 8020 Enabled
ManageEngine Port 8027 Enabled
ManageEnginePort8031 Enabled
HTTP 8080 in Mobileiron Enabled
WatchGuard Web UI Enabled
ManageEnginePort8443 Enabled
HTTPS Sentry Enabled
Port8443 Enabled
Port8443-ESRS Enabled
Traveler-Sync_DMZ_zu_LAN Enabled
Traveler-Sync_dmzWLAN_zuDMZ Enabled
Traveler-Sync_WAN_zu_DMZ Enabled
Port 9001 Enabled
SMB-MobileIron-Fileserver Enabled
Port9443-ESRS Enabled
Port 9997 Mobileiron Enabled
Port 9997 MobIron.WLAN Enabled
NagiosClient Enabled
Port 51543 Enabled
Ping Enabled
DNS Enabled
DNS.1 Enabled
NTP_DMZ Enabled
NTP Enabled
NTP_Extern Enabled
Lotus-Notes_Retarus-Replik Disabled
Lotus-Notes_DMZ_zu_LAN Disabled
Lotus-Notes_LAN_zu_DMZ Disabled
Lotus-Notes_WAN-zu_DMZ Disabled
Aplle MDM Enabled
Elster Enabled
IPSec Enabled
WatchGuard Enabled
Barracuda VPN Enabled
AlcatelTelefon Disabled
SNMP-Trap Disabled
DATA_Domain_REP_Port Enabled
DellPerfomance Disabled
SkypeBuisiness Enabled
TEN-IT_VPN_DATA_DOMAIN.in Enabled
Dakoso_Vpn.in Enabled
Lobster_VPN.in Enabled
SAP_VPN_Nagarro_.in Enabled
BOVPN-Allow.in Enabled
Send Notification
Send Notification
Send SNMP trap Disabled
Send notification Disabled
Quarantine Server
IP Address 172.17.0.96
Port 4120
Details
HTTP-Client.KIOSKPC
Enabled
Immediately block URLs that have a bad reputation Log: Disabled
Alarm: Disabled
Bypass any configured virus scanning for URLs that have a good Disabled
Log: Disabled
reputation Alarm: Disabled
Bad reputation threshold 90
Good reputation threshold 10
HTTP-Client.Wachter
Enabled
Immediately block URLs that have a bad reputation Log: Disabled
Alarm: Disabled
Bypass any configured virus scanning for URLs that have a good Disabled
Log: Disabled
reputation Alarm: Disabled
Bad reputation threshold 90
Good reputation threshold 10
Botnet Detection
Enable traffic from suspected botnet sites Enabled
Update Server
Automatic Signature Update
Enable automatic update Enabled
Update server URL https://services.watchguard.com
Threat Actions
Threat Level Action Alarm Log
High Drop Disabled Enabled
Medium Drop Disabled Enabled
Low Drop Disabled Enabled
Advanced
Local Server
Send APT Blocker requests to a local on-premise server Disabled
HTTP Proxy
Connect to the APT Blocker server with an HTTP proxy server Disabled
Send Notification
Send Notification
Send SNMP trap Disabled
Send notification Email
Launch interval 15 minutes
Repeat count 10
4. Authentication
4-1 Hotspot
Disabled
4-2 Servers
Authentication Servers
Name Type Primary Backup
Firebox-DB Firebox-DB
AuthPoint
schillseilacher.de RADIUS 172.17.0.157 0.0.0.0
LDAP LDAP 172.17.0.50 0.0.0.0
bb.schillseilacher.de Active Directory 172.17.0.50 172.17.0.60
4-3 Settings
Firewall Authenticaton
Session Timeout Never time out
Idle Timeout 2 hours
Allow unlimited concurrent firewall authentication logins from the same account Enabled
Default authentication server on the authentication page Firebox-DB
Automatically redirect users to the authentication page Disabled
Send a redirect to the browser after successful authentication Disabled
Management Session
Session Timeout 10 hours
Idle Timeout 15 minutes
5. VPN
Lobster-Data-VPN-GW Settings
Gateway Name Credential Method
Lobster-Data-VPN-GW Using Pre-shared Key
Gateway Endpoints
Local Interface Local Type Local ID Remote IP Remote Type Remote ID
1 T-Com_WAN IP Address 80.156.231.138 80.67.236.210 IP Address 80.67.236.210
Phase1 Settings
Version IKEv2
Status Enabled
NAT Traversal
Keep-alive Interval 30 seconds
Status Enabled
Dead Peer Detection Type Traffic-Based
(RFC3706) Traffic idle timeout 20 seconds
Max retries 10
Transform Settings
Index Authentication Encryption SA Life Key Group
1 SHA2-256 AES (256-bit) 8 hours Diffie-Hellman Group 14
Gateway Endpoints
Local Interface Local Type Local ID Remote IP Remote Type Remote ID
1 T-Com_WAN IP Address 80.156.231.138 109.234.191.7 IP Address 109.234.191.7
Phase1 Settings
Version IKEv2
Status Enabled
NAT Traversal
Keep-alive Interval 20 seconds
Status Enabled
Dead Peer Detection Type Traffic-Based
(RFC3706) Traffic idle timeout 20 seconds
Max retries 5
Transform Settings
Index Authentication Encryption SA Life Key Group
1 SHA2-256 AES (256-bit) 1 day Diffie-Hellman Group 14
Ten_IT_VPN_Data_Domain Settings
Gateway Name Credential Method
Ten_IT_VPN_Data_Domain Using Pre-shared Key
Gateway Endpoints
Local Interface Local Type Local ID Remote IP Remote Type Remote ID
1 T-Com_WAN IP Address 80.156.231.138 85.158.5.162 IP Address 85.158.5.162
Phase1 Settings
Version IKEv2
Status Enabled
NAT Traversal
Keep-alive Interval 20 seconds
Status Enabled
Dead Peer Detection Type Traffic-Based
(RFC3706) Traffic idle timeout 20 seconds
Max retries 5
Transform Settings
Index Authentication Encryption SA Life Key Group
1 SHA2-256 AES (256-bit) 1 day Diffie-Hellman Group 14
dacoso_gateway_darktrace Settings
Gateway Name Credential Method
dacoso_gateway_darktrace Using Pre-shared Key
Gateway Endpoints
Local Interface Local Type Local ID Remote IP Remote Type Remote ID
1 T-Com_WAN IP Address 80.156.231.138 78.138.124.140 IP Address 10.0.12.243
Phase1 Settings
Version IKEv2
Status Enabled
NAT Traversal
Keep-alive Interval 10 seconds
Status Enabled
Dead Peer Detection Type Traffic-Based
(RFC3706) Traffic idle timeout 20 seconds
Max retries 3
Transform Settings
Index Authentication Encryption SA Life Key Group
1 8 hours Diffie-Hellman Group 20
Nagarro DEFRA
Tunnel Name Gateway
Nagarro DEFRA Nagarro DEFRA
Tunnel routes
1 Local 80.67.237.159
Local 80.67.237.238
Direction Local <==> Remote
2 Remote 10.169.58.0/24
1-to-1 NAT Disabled
DNAT Disabled
Local 172.17.0.0/16
Direction Local <==> Remote
3 Remote 109.234.190.64/26
1-to-1 NAT Disabled
DNAT Disabled
Local 172.17.0.0/16
Direction Local <==> Remote
4 Remote 10.169.58.0/24
1-to-1 NAT Disabled
DNAT Disabled
Phase2 Settings
PFS Enabled
Diffie-Hellman Group Diffie-Hellman Group 14
IPSec Proposals Nagarro
Dacoso_Darktrace_VPN
Tunnel Name Gateway
Dacoso_Darktrace_VPN dacoso_gateway_darktrace
Tunnel routes
Local 10.0.91.16/28
Direction Local <==> Remote
1 Remote 10.0.91.0/28
1-to-1 NAT Disabled
DNAT Disabled
Phase2 Settings
PFS Enabled
Diffie-Hellman Group Diffie-Hellman Group 20
IPSec Proposals phase2_proposal.Dacoso
tunnel.1
Tunnel Name Gateway
tunnel.1 Ten_IT_VPN_Data_Domain
Tunnel routes
Local 172.17.1.0/24
Direction Local <==> Remote
1 Remote 10.82.0.0/16
1-to-1 NAT Disabled
DNAT Disabled
Phase2 Settings
PFS Enabled
Diffie-Hellman Group Diffie-Hellman Group 14
IPSec Proposals ESP-AES256-SHA256
Lobster-DATA-Live238_Stage159
Tunnel Name Gateway
Lobster-DATA-Live238_Stage159 Lobster-Data-VPN-GW
Tunnel routes
Local 10.169.58.0/24
Direction Local <==> Remote
1 Remote 80.67.237.238
1-to-1 NAT Disabled
DNAT Disabled
Local 10.169.58.0/24
Direction Local <==> Remote
2 Remote 80.67.237.159
1-to-1 NAT Disabled
DNAT Disabled
Local 172.17.0.0/16
Direction Local <==> Remote
3 Remote 80.67.237.159
1-to-1 NAT Disabled
DNAT Disabled
Local 172.17.0.0/16
Direction Local <==> Remote
4 Remote 80.67.237.238
1-to-1 NAT Disabled
DNAT Disabled
Phase2 Settings
PFS Enabled
Diffie-Hellman Group Diffie-Hellman Group 14
IPSec Proposals Lobster
Phase2 Proposals
Name Description Editable
ESP-AES-SHA1 None No
ESP-AES-MD5 None No
ESP-3DES-SHA1 None No
ESP-3DES-MD5 None No
ESP-DES-SHA1 None No
ESP-DES-MD5 None No
ESP-AES256-SHA256 None No
ESP-AES128-SHA1 None No
ESP-AES128-GCM None No
ESP-AES192-GCM None No
ESP-AES256-GCM None No
BEOS-IPSEC_mu Created by Policy Manager Yes
Bechtle-IPSEC_mu Created by Policy Manager Yes
Lobster None Yes
Nagarro None Yes
Olschewski_mu Created by Policy Manager Yes
Service-Partner_mu Created by Policy Manager Yes
VPN-Benutzer-MFA_mu Created by Policy Manager Yes
VPN-Benutzer_mu Created by Policy Manager Yes
VPN-Bilgram_mu Created by Policy Manager Yes
VPN-DiehlES_mu Created by Policy Manager Yes
VPN-DiehlK_mu Created by Policy Manager Yes
VPN-Extern-MFA_mu Created by Policy Manager Yes
VPN-iPhone_mu Created by Policy Manager Yes
phase2_proposal.1 None Yes
phase2_proposal.Dacoso None Yes
Bechtle-IPSEC_mu
Type ESP
Authentication SHA1
Encryption AES 256-bit
Time 8 hours
Force Key Expiration
Traffic 128000 Kb
Lobster
Type ESP
Authentication SHA2-256
Encryption AES 256-bit
Time 1 hour
Force Key Expiration
Traffic Disabled
Nagarro
Type ESP
Authentication SHA2-256
Encryption AES 256-bit
Time 1 hour
Force Key Expiration
Traffic Disabled
Olschewski_mu
Type ESP
Authentication SHA2-256
Encryption AES 256-bit
Time 8 hours
Force Key Expiration
Traffic Disabled
Service-Partner_mu
Type ESP
Authentication SHA2-256
Encryption AES 256-bit
Time 8 hours
Force Key Expiration
Traffic Disabled
VPN-Benutzer-MFA_mu
Type ESP
Authentication SHA2-256
Encryption AES 256-bit
Time 8 hours
Force Key Expiration
Traffic Disabled
VPN-Benutzer_mu
Type ESP
Authentication SHA1
Encryption AES 256-bit
Time 8 hours
Force Key Expiration
Traffic 128000 Kb
VPN-Bilgram_mu
Type ESP
Authentication SHA1
Encryption AES 256-bit
Time 8 hours
Force Key Expiration
Traffic 128000 Kb
VPN-DiehlES_mu
Type ESP
Authentication SHA1
Encryption AES 256-bit
Time 8 hours
Force Key Expiration
Traffic 128000 Kb
VPN-DiehlK_mu
Type ESP
Authentication SHA1
Encryption AES 256-bit
Time 8 hours
Force Key Expiration
Traffic 128000 Kb
VPN-Extern-MFA_mu
Type ESP
Authentication SHA2-256
Encryption AES 256-bit
Time 8 hours
Force Key Expiration
Traffic Disabled
VPN-iPhone_mu
Type ESP
Authentication SHA1
Encryption AES 256-bit
Time 1 hour
Force Key Expiration
Traffic 24576 Kb
phase2_proposal.1
Type ESP
Authentication
Encryption
Time 8 hours
Force Key Expiration
Traffic 128000 Kb
phase2_proposal.Dacoso
Type ESP
Authentication
Encryption
Time 1 hour
Force Key Expiration
Traffic Disabled
Policy
Order Action Policy Name Log Alarm From To Port
1 Enabled VPN-iPhoneDNS Disabled Disabled VPN-iPhone Any 53
2 Enabled Tunnel-MFA-AlcatelTelefon Enabled Disabled VPN-Benutzer-MFA Any 7
3 Enabled Tunnel-AlcatelTelefon.1 Disabled Disabled VPN-Benutzer Any 7
4 Enabled VPN-DiehlES-Any Disabled Disabled VPN-DiehlES Any 0
5 Enabled VPN-DiehlK-Any Disabled Disabled VPN-DiehlK Any 0
6 Enabled VPN-Extern-MFA-Any Disabled Disabled VPN-Extern-MFA Any 0
7 Enabled Bechtle-IPSEC-Any Disabled Disabled Bechtle-IPSEC Any 0
8 Enabled BEOS-IPSEC-Any Enabled Disabled BEOS-IPSEC Any 0
9 Enabled VPN-iPhone-Any Disabled Disabled VPN-iPhone Any 0
10 Enabled VPN-Benutzer-Any Disabled Disabled VPN-Benutzer Any 0
11 Enabled Olschewski-Any Disabled Disabled Olschewski Any 0
12 Enabled Service-Partner-Any Disabled Disabled Service-Partner Any 0
13 Enabled VPN-Bilgram-Any Disabled Disabled VPN-Bilgram Any 0
14 Enabled Tunnel-RDP Disabled Disabled VPN-Benutzer Any 3389
15 Enabled Tunnel-DNS Enabled Disabled VPN-Benutzer Any 53
16 Disabled Tunnel-DHCP-Server Enabled Disabled VPN-Benutzer Any 67
17 Enabled Tunnel-AlcatelTelefon Enabled Disabled VPN-Benutzer Any 7
18 Enabled Tunnel-Https-SW-Netz Enabled Disabled VPN-Benutzer Any 80
19 Disabled Tunnel-Addison-Ports Enabled Disabled VPN-Benutzer Any 6001
20 Enabled Tunnel-SSH Enabled Disabled VPN-Benutzer Any 22
21 Enabled Tunnel-Tunnel Domino01 Port Enabled Disabled VPN-Benutzer Any 1352
22 Enabled Tunnel-OPAL_Lizens_Port.1 Enabled Disabled VPN-Benutzer Any 5160
23 Enabled VPN-Benutzer-MFA-Any Enabled Disabled VPN-Benutzer-MFA Any 0
24 Enabled Tunnel-MFA-RDP.1 Enabled Disabled VPN-Benutzer-MFA Any 3389
25 Enabled Tunnel-MFA-DNS Enabled Disabled VPN-Benutzer-MFA Any 53
26 Enabled Tunnel-MFA-DHCP-Server Enabled Disabled VPN-Benutzer-MFA Any 67
27 Enabled Tunnel-MFA-Addison-Ports Enabled Disabled VPN-Benutzer-MFA Any 6001
28 Enabled Tunnel-MFA-SSH Enabled Disabled VPN-Benutzer-MFA Any 22
29 Enabled Tunnel-OPAL_Lizens_Port Enabled Disabled VPN-Benutzer-MFA Any 5160
BEOS-IPSEC
Authentication Server Firebox-DB
Firebox IP Address 80.156.231.138
Timeout None
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Any-External
Allowed Resources 172.17.0.0/16
Connection mode Manual
Inactivity timeout Disabled
Bechtle-IPSEC
Authentication Server Firebox-DB
Firebox IP Address 80.156.231.138
Timeout None
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Any-External
Allowed Resources 0.0.0.0/0
Connection mode Manual
Inactivity timeout Disabled
Olschewski
Authentication Server Firebox-DB
Firebox IP Address 80.156.231.138
Timeout None
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Any-External
Allowed Resources 0.0.0.0/0
Connection mode Manual
Inactivity timeout Disabled
Service-Partner
Authentication Server Firebox-DB
VPN-Benutzer
Authentication Server bb.schillseilacher.de
Firebox IP Address 80.156.231.138
Timeout None
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Any-External
Allowed Resources 0.0.0.0/0
Connection mode Manual
Inactivity timeout Disabled
VPN-Benutzer-MFA
Authentication Server schillseilacher.de
Firebox IP Address 80.156.231.138
Timeout 10 seconds
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Any-External
Allowed Resources 0.0.0.0/0
Connection mode Manual
Inactivity timeout Disabled
VPN-Bilgram
Authentication Server bb.schillseilacher.de
Firebox IP Address 80.156.231.138
Timeout None
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Any-External
Allowed Resources 0.0.0.0/0
Connection mode Manual
Inactivity timeout Disabled
VPN-DiehlES
Authentication Server bb.schillseilacher.de
Firebox IP Address 80.156.231.138
Timeout None
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Any-External
Allowed Resources 0.0.0.0/0
Connection mode Manual
Inactivity timeout Disabled
VPN-DiehlK
Authentication Server bb.schillseilacher.de
Firebox IP Address 80.156.231.138
Timeout None
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Any-External
Allowed Resources 0.0.0.0/0
Connection mode Manual
Inactivity timeout Disabled
VPN-Extern-MFA
Authentication Server schillseilacher.de
Firebox IP Address 80.156.231.138
Timeout 10 seconds
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Allowed Resources 172.17.0.0/16
Connection mode Manual
Inactivity timeout Disabled
VPN-iPhone
Authentication Server bb.schillseilacher.de
Firebox IP Address 80.156.231.138
Timeout None
Tunnel Authentication Method Using Pre-shared Key
Force All Traffic Through Tunnel Disabled
Any-External
Allowed Resources 0.0.0.0/0
Connection mode Manual
Inactivity timeout Disabled
VPN Configuration
Enable IPSec pass-through Disabled
IPSec Settings
Enable TOS for IPSec Disabled
LDAP Server Settings for CRL Enable LDAP Server for certificate verification Disabled
6. System
6-1 Information
Device Configuration
Firebox Model M690
Name SUS-WG-Cluster-M690
Location
Contact
Time zone Brusels, Berlin, Bern, Rome, Stockholm, Vienna (GMT+01:00)
6-2 NTP
NTP Settings
NTP Server Names/IPs
time.google.com
6-3 SNMP
SNMP Settings
Version v1/v2c
Community String public
SNMP TRAPS
Version v2Trap
Use NAT for connections through the SNMP application layer gateway Enabled
6-4 NetFlow
Disabled
WatchGuard Cloud
WatchGuard Cloud Disabled
Centralized Management
Centralized Management Enabled [Management Server]
Management Server
Managed Device Name 172.17.0.7
Management Server IP Address(es) 172.17.0.96
Management Tunnel
Use an SSL Tunnel for Remote Management Disabled
6-7 Logging
Syslog Server
Using Syslog Server Enabled
Syslog Server
IP Address 172.17.0.93
Port 514
Log Format Syslog
The time stamp Enabled
The serial number of the device Enabled
Alarm Local0
Traffic Local1
Event Local2
Diagnostic Local3
Performance Local4
Settings
Send log messages to Firebox Internal storage Enabled
Send external interface and VPN bandwidth statistics to log file Enabled
Send Security Services Statistics to log file Enabled
Send log messages when the configuration for this Firebox is changed Enabled
Enable logging for traffic sent from this device Enabled
Enable IKE packet tracing to Firebox internal storage Enabled
Diagnostic Log
Trace Type Trace Level
Authentication Debug
Error
Error
FireCluster Error
Cluster Management Error
Cluster Operation Error
General
Web UI Port 8080
Schedule time for reboot Disabled
Device Feedback Disabled
Fault Report Disabled
Enable more than one Device Administrator to log in at the same time Enabled
Networking
ICMP Error Handling
Fragmentation Req (PMTU) Enabled
Host Unreachable Enabled
Timeout Enabled
Port Unreachable Enabled
Network Unreachable Enabled
Protocol Unreachable Enabled
Autotask
Disabled
ConnectWise
Disabled
Tigerpaw
Disabled
Settings
Account Lockout
Enable account lockout Disabled
6-13 FireCluster
Properties
Status Enabled
Mode Active/Passive
ID 50
Load-balance Method Least Connection
Primary Cluster Interface 9 (Optional-8)
Backup Cluster Interface Disabled
Interface for Management IP Address 1 (S+S LAN)
1 (S+S LAN)
2 (S+S DMZ)
4 (DMZ-WLAN)
Monitored Interface 5 (IPPhone)
6 (T-Com_WAN)
7 (SuS_Labor)
0 ()
Lost Heartbeat Threshold 3
Monitor Hardware Disabled
Send Notification
Send Notification
Send SNMP trap Disabled
Send notification Email
Launch interval 15 minutes
Repeat count 10
Members
Member Name Member1
Member ID C03C0294A9663
Primary Cluster IP Address 169.254.0.1/30
Backup Cluster IP Address 0.0.0.0/0
Management IP Address 172.17.5.253/16